Login / Signup
A Secure Comparison Protocol in the Malicious Model.
Junhong Tao
Yongtang Wu
Yuling Chen
Published in:
iThings/GreenCom/CPSCom/SmartData/Cybermatics (2022)
Keyphrases
</>
computational model
mathematical model
formal model
similarity measure
experimental data
database systems
bayesian networks
prior knowledge
probabilistic model
security model
colored petri nets