Login / Signup

Efficient Set Operations in the Presence of Malicious Adversaries.

Carmit HazayKobbi Nissim
Published in: J. Cryptol. (2012)
Keyphrases
  • databases
  • real world
  • artificial intelligence
  • image processing
  • wide range
  • search algorithm
  • database
  • genetic algorithm
  • knowledge base
  • multiresolution
  • highly efficient