A Two-Party Privacy Preserving Set Intersection Protocol Against Malicious Users in Cloud Computing.
Computer Standards & Interfaces(2016)
Key words
Set intersection,Commutative encryption,Malicious participants,Data mining
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined