First Page | Document Content | |
---|---|---|
Date: 2013-07-08 15:39:55Ciphertext indistinguishability Voronoi diagram Chosen-plaintext attack Cryptography Homomorphic encryption RSA | Secure Nearest Neighbor Revisited Bin Yao1 , Feifei Li2 , Xiaokui Xiao3 1 Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, ChinaAdd to Reading ListSource URL: www.cs.utah.eduDownload Document from Source WebsiteFile Size: 319,64 KBShare Document on Facebook |