Login / Signup

A two-party privacy preserving set intersection protocol against malicious users in cloud computing.

Xuefei CaoHui LiLanjun DangYin Lin
Published in: Comput. Stand. Interfaces (2017)
Keyphrases