Login / Signup

Secure computation of functionalities based on Hamming distance and its application to computing document similarity.

Ayman JarrousBenny Pinkas
Published in: Int. J. Appl. Cryptogr. (2013)
Keyphrases