ŞEHİR e-arşiv

Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

Files in this item

This item appears in the following Collection(s)

Search ŞEHİR e-arşiv


Advanced Search

Browse

My Account

Statistics