Efficient Set Operations in the Presence of Malicious Adversaries

Carmit Hazay, Kobbi Nissim

Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings  — 2010

BibTeX

@inproceedings{DBLP:conf/pkc/HazayN10,
  author = {Hazay, Carmit and Nissim, Kobbi},
  editor = {Nguyen, Phong Q. and Pointcheval, David},
  title = {Efficient Set Operations in the Presence of Malicious Adversaries},
  booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                    on Practice and Theory in Public Key Cryptography, Paris, France,
                    May 26-28, 2010. Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {6056},
  pages = {312--331},
  publisher = {Springer},
  year = {2010},
  url = {https://doi.org/10.1007/978-3-642-13013-7\_19},
  doi = {10.1007/978-3-642-13013-7\_19},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl = {https://dblp.org/rec/conf/pkc/HazayN10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}