Login / Signup

Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer.

Mehmet Sabir KirazZiya Alper GençSüleyman Kardas
Published in: Secur. Commun. Networks (2015)
Keyphrases
  • data analysis
  • distance computation
  • cryptographic protocols
  • data sets
  • databases
  • feature selection
  • similarity search
  • pattern matching