Inproceedings,

Efficient Set Operations in the Presence of Malicious Adversaries.

, and .
Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 312-331. Springer, (2010)

Meta data

Tags

Users

  • @dblp

Comments and Reviews