Efficient Protocols for Set Intersection and Pattern Matching With Security Against Malicious and Covert Adversaries
doi 10.1007/978-3-540-78524-8_10
Full Text
Open PDFAbstract
Available in full text
Date
Unknown
Authors
Publisher
Springer Berlin Heidelberg