Login / Signup

Comparison-based computations over fully homomorphic encrypted data.

Mihai ToganCezar Plesca
Published in: COMM (2014)
Keyphrases
  • encryption scheme
  • third party
  • privacy preserving
  • dynamic allocation
  • databases