Login / Signup
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.
Carmit Hazay
Tomas Toft
Published in:
J. Cryptol. (2014)
Keyphrases
</>
pattern matching
regular expressions
tree matching
string matching
semi honest
pattern matching algorithm
matching process
boyer moore
lossy compression
search engine
information retrieval
privacy preserving
hamming distance
data model
search algorithm
web pages
database