A two-party privacy preserving set intersection protocol against malicious users in cloud computing
2017 ◽
Vol 54
◽
pp. 41-45
◽
2018 ◽
Vol 2018
◽
pp. 1-12
◽
2012 ◽
Vol 35
(11)
◽
pp. 2215
◽
2021 ◽
Vol 1916
(1)
◽
pp. 012079
Keyword(s):
2019 ◽
Vol 140-141
◽
pp. 38-60
◽
Keyword(s):
2017 ◽
Vol 74
◽
pp. 76-85
◽
2019 ◽
Vol 127
◽
pp. 59-69
◽