CryptoDB
Efficient Set Operations in the Presence of Malicious Adversaries
Authors: | |
---|---|
Download: | |
Presentation: | Slides |
Conference: | PKC 2010 |
Video from PKC 2010
BibTeX
@inproceedings{pkc-2010-23424, title={Efficient Set Operations in the Presence of Malicious Adversaries}, booktitle={Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series={Lecture Notes in Computer Science}, publisher={Springer}, volume={6056}, pages={312-331}, url={https://www.iacr.org/archive/pkc2010/60560317/60560317.pdf}, doi={10.1007/978-3-642-13013-7_19}, author={Carmit Hazay and Kobbi Nissim}, year=2010 }