Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay, Kobbi Nissim
BibTeX
@inproceedings{DBLP:conf/pkc/HazayN10,
author = {Hazay, Carmit and Nissim, Kobbi},
editor = {Nguyen, Phong Q. and Pointcheval, David},
title = {Efficient Set Operations in the Presence of Malicious Adversaries},
booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference
on Practice and Theory in Public Key Cryptography, Paris, France,
May 26-28, 2010. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {6056},
pages = {312--331},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-13013-7\_19},
doi = {10.1007/978-3-642-13013-7\_19},
timestamp = {Fri, 01 May 2020 18:32:25 +0200},
biburl = {https://dblp.org/rec/conf/pkc/HazayN10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}