| Document Date: 2013-11-21 20:23:02 Open Document File Size: 108,91 KBShare Result on Facebook
Company Cambridge University Press / / Facility National Institute of Information / / IndustryTerm approximate protocol / set-intersection protocol / stream algorithm / approximation algorithm / non-secure protocol / few existing protocols / potential practical applications / Internet applications / potential applications / existent protocols / cryptographic protocols / non-secure set-intersection protocol / secure set-intersection protocols / secure set-intersection protocol / rapid protocol / cryptographic protocol / traceback technology / space-efficient algorithm / / OperatingSystem DoS / / Organization Cambridge University / National Institute of Information / / Person Eyal Kushilevitz / Michael J. Freedman / Kobbi Nissim / Andrew Chi-Chih Yao / Michael Mitzenmacher / Traceable Secure / Ramamohan Paturi / Bob / Alice / Taher ElGamal / Benny Pinkas / George Varghese / Kirill Levchenko / Noam Nissan / Pascal Paillier / / Position Researcher / author / / ProvinceOrState Quebec / Virginia / / PublishedMedium IEEE Transactions on Information Theory / / Technology second protocol / few existing protocols / modified protocol / two-party secure set-intersection protocol / cryptographic protocol / remaining two protocols / approximate protocol / secret key / non-secure set-intersection protocol / set-intersection protocol / encryption / Cryptography / rapid protocol / 4 Approximate protocol / public key / SSL technologies / three protocols / secure set-intersection protocol / approximation algorithm / non-secure protocol / traceback technology / Information Security Research Center Algorithm / secure set-intersection protocols / third protocol / last protocol / stream algorithm / 4.3 Protocol / / URL http /
SocialTag |