Login / Signup
Efficient Set Operations in the Presence of Malicious Adversaries.
Carmit Hazay
Kobbi Nissim
Published in:
J. Cryptol. (2012)
Keyphrases
</>
databases
real world
artificial intelligence
image processing
wide range
search algorithm
database
genetic algorithm
knowledge base
multiresolution
highly efficient