Information and Communications Security
Springer International Publishing
Chapter title |
How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity
|
---|---|
Chapter number | 34 |
Book title |
Information and Communications Security
|
Published in |
Lecture notes in computer science, November 2016
|
DOI | 10.1007/978-3-319-50011-9_34 |
Book ISBNs |
978-3-31-950010-2, 978-3-31-950011-9
|
Authors |
Sumit Kumar Debnath, Ratna Dutta |
Editors |
Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing |
Country | Count | As % |
---|---|---|
Unknown | 21 | 100% |
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 5 | 24% |
Student > Master | 4 | 19% |
Researcher | 4 | 19% |
Lecturer | 1 | 5% |
Other | 1 | 5% |
Other | 1 | 5% |
Unknown | 5 | 24% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 14 | 67% |
Mathematics | 1 | 5% |
Physics and Astronomy | 1 | 5% |
Social Sciences | 1 | 5% |
Unknown | 4 | 19% |