Login / Signup

Encrypted Set Intersection Protocol for Outsourced Datasets.

Fang LiuWee Keong NgWei ZhangDo Hoang GiangShuguo Han
Published in: IC2E (2014)
Keyphrases
  • set intersection
  • third party
  • constraint networks
  • global consistency
  • lightweight
  • security analysis
  • machine learning