Login / Signup

Using private set intersection to achieve privacy-preserving authorization for IoT systems.

Rongsheng CaiLanxiang ChenYizhao Zhu
Published in: J. Inf. Secur. Appl. (2024)
Keyphrases