Efficient set operations in the presence of malicious adversaries

Carmit Hazay, Kobbi Nissim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

85 Scopus citations

Fingerprint

Dive into the research topics of 'Efficient set operations in the presence of malicious adversaries'. Together they form a unique fingerprint.

Keyphrases

Computer Science