5PM: secure pattern matching
From MaRDI portal
Publication:2912798
Recommendations
- Computationally secure pattern matching in the presence of malicious adversaries
- Computationally secure pattern matching in the presence of malicious adversaries
- SWiM: secure wildcard pattern matching from OT extension
- Efficient and secure generalized pattern matching via Fast Fourier Transform
- Automata evaluation and text search protocols with simulation-based security
Cited in
(16)- Computationally secure pattern matching in the presence of malicious adversaries
- Communication-Efficient Private Protocols for Longest Common Subsequence
- Private subgraph matching protocol
- Computationally secure pattern matching in the presence of malicious adversaries
- Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer
- SWiM: secure wildcard pattern matching from OT extension
- Pattern matching on encrypted streams
- Secure parameterized pattern matching
- Verifiable pattern matching on outsourced texts
- Verifiable pattern matching on outsourced texts
- Efficient and secure outsourced approximate pattern matching protocol
- Outsourced pattern matching
- Efficient and secure generalized pattern matching via Fast Fourier Transform
- Public Key Encryption with Flexible Pattern Matching
- Automata evaluation and text search protocols with simulation-based security
- Private fingerprint matching
This page was built for publication: 5PM: secure pattern matching
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2912798)