Publisher
Springer International Publishing
Reference34 articles.
1. R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, Order preserving encryption for numeric data, in Proc. ACM Int. Conf. on Management of Data (SIGMOD) (2004), pp. 563–574
2. A.V. Aho, M.J. Corasick, Efficient string matching: an aid to bibliographic search. Commun. ACM 18(6), 333–340 (1975)
3. F. Boudot, Efficient proofs that a committed number lies in an interval, in Proc. Advances in Cryptology (EUROCRYPT). Lecture Notes in Computer Science, vol. 1807, May 2000
4. Y.-K. Chang, Fast binary and multiway prefix searches for packet forwarding. Comput. Netw. 51(3), 588–605 (2007)
5. D. Chaum, C. Crepeau, I. Damgard, Multiparty unconditionally secure protocols, in Proc. ACM Symposium on Theory of Computing (1988), pp. 11–19
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献