Efficient Set Operations in the Presence of Malicious Adversaries

Title
Efficient Set Operations in the Presence of Malicious Adversaries
Authors
Keywords
-
Journal
JOURNAL OF CRYPTOLOGY
Volume 25, Issue 3, Pages 383-433
Publisher
Springer Nature
Online
2011-03-02
DOI
10.1007/s00145-011-9098-x

Ask authors/readers for more resources

Add your recorded webinar

Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.

Upload Now

Create your own webinar

Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.

Create Now