Login / Signup
Secure Set Intersection with Untrusted Hardware Tokens.
Marc Fischlin
Benny Pinkas
Ahmad-Reza Sadeghi
Thomas Schneider
Ivan Visconti
Published in:
CT-RSA (2011)
Keyphrases
</>
set intersection
sensitive data
low cost
third party
constraint networks
real time
global consistency
hardware implementation
privacy preserving
computer systems
trusted computing
data privacy