Login / Signup
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer.
Mehmet Sabir Kiraz
Ziya Alper Genç
Süleyman Kardas
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
data analysis
distance computation
cryptographic protocols
data sets
databases
feature selection
similarity search
pattern matching