Chrome Extension
WeChat Mini Program
Use on ChatGLM

A Two-Party Privacy Preserving Set Intersection Protocol Against Malicious Users in Cloud Computing.

Computer Standards & Interfaces(2016)

Cited 14|Views24
Key words
Set intersection,Commutative encryption,Malicious participants,Data mining
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined