Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay, Kobbi Nissim
BibTeX
@article{DBLP:journals/iacr/HazayN09,
author = {Hazay, Carmit and Nissim, Kobbi},
title = {Efficient Set Operations in the Presence of Malicious Adversaries},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {594},
year = {2009},
url = {http://eprint.iacr.org/2009/594},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/HazayN09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}