Login / Signup

A Secure Comparison Protocol in the Malicious Model.

Junhong TaoYongtang WuYuling Chen
Published in: iThings/GreenCom/CPSCom/SmartData/Cybermatics (2022)
Keyphrases
  • computational model
  • mathematical model
  • formal model
  • similarity measure
  • experimental data
  • database systems
  • bayesian networks
  • prior knowledge
  • probabilistic model
  • security model
  • colored petri nets