Subject
Law,Hardware and Architecture,Software,General Computer Science,Computer Science Applications
Reference41 articles.
1. Protocols for secure computations;Yao,1982
2. How to generate and exchange secrets (extended abstract);Yao,1986
3. Quantum private set intersection cardinality and its application to anonymous authentication;Shi;Inf. Sci.,2016
4. Secure approximate pattern matching protocol via boolean threshold private set intersection;Wei;Int. J. Intell. Syst.,2022
5. Secure video retrieval using image query on an untrusted cloud;Yan;Appl. Soft Comput.,2020