Article,

Efficient Set Operations in the Presence of Malicious Adversaries.

, and .
J. Cryptol., 25 (3): 383-433 (2012)

Meta data

Tags

Users

  • @dblp

Comments and Reviews