Login / Signup
An Ideal-Security Protocol for Order-Preserving Encoding.
Raluca A. Popa
Frank H. Li
Nickolai Zeldovich
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
order preserving
security protocols
linear hashing
artificial immune algorithm
minimal perfect hash functions
security services
hash functions
security requirements
key management
security mechanisms
authentication protocol
real time
linear combination
similarity search