Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
181
views
14
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,387
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security
Efficient Robust Private Set Intersection
other
Author(s):
Dana Dachman-Soled
,
Tal Malkin
,
Mariana Raykova
,
Moti Yung
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
REPO-TRIAL
Most cited references
14
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier
(1999)
0
comments
Cited
367
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
307
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Privacy Preserving Data Mining
Yehuda Lindell
,
Benny Pinkas
(2000)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 125-142
DOI:
10.1007/978-3-642-01957-9_8
SO-VID:
6567df32-e01c-49b9-aefa-5e3c2c94a0a0
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 125
Efficient Robust Private Set Intersection
pp. 168
Dual-Policy Attribute Based Encryption
pp. 292
Homomorphic MACs: MAC-Based Integrity for Network Coding
pp. 499
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
Similar content
2,387
Beyond alpha power: EEG spatial and spectral gradients robustly stratify disorders of consciousness
Authors:
Michele Angelo Colombo
,
Angela Comanducci
,
Silvia Casarotto
…
Nanoparticle Vaccines Based on the Receptor Binding Domain (RBD) and Heptad Repeat (HR) of SARS-CoV-2 Elicit Robust Protective Immune Responses
Authors:
Xiancai Ma
,
Fan Zou
,
Fei Yu
…
Competencia digital en docentes de Ciencias de la Salud de una universidad privada de Lima
Translated title: Digital competence in teachers of health sciences in a private university in Lima
Authors:
María de los Ángeles Sánchez Trujillo
,
Eduar Rodríguez Flores
See all similar
Cited by
15
Efficient Set Intersection with Simulation-Based Security
Authors:
Michael Freedman
,
Carmit Hazay
,
Kobbi Nissim
…
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Authors:
Emiliano De Cristofaro
,
Jihye Kim
,
Gene Tsudik
Improved Private Set Intersection Against Malicious Adversaries
Authors:
Peter Rindal
,
Mike Rosulek
See all cited by