Login / Signup
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
Emiliano De Cristofaro
Jihye Kim
Gene Tsudik
Published in:
ASIACRYPT (2010)
Keyphrases
</>
machine learning
probabilistic model
linear complexity
similarity measure
objective function
special case
access control
security analysis