5PM: secure pattern matching
From MaRDI portal
Publication:2912798
Recommendations
- Computationally secure pattern matching in the presence of malicious adversaries
- Computationally secure pattern matching in the presence of malicious adversaries
- SWiM: secure wildcard pattern matching from OT extension
- Efficient and secure generalized pattern matching via Fast Fourier Transform
- Automata evaluation and text search protocols with simulation-based security
Cited in
(16)- Communication-Efficient Private Protocols for Longest Common Subsequence
- SWiM: secure wildcard pattern matching from OT extension
- Secure parameterized pattern matching
- Private subgraph matching protocol
- Private fingerprint matching
- Automata evaluation and text search protocols with simulation-based security
- Verifiable pattern matching on outsourced texts
- Verifiable pattern matching on outsourced texts
- Computationally secure pattern matching in the presence of malicious adversaries
- Public Key Encryption with Flexible Pattern Matching
- Computationally secure pattern matching in the presence of malicious adversaries
- Efficient and secure generalized pattern matching via Fast Fourier Transform
- Efficient and secure outsourced approximate pattern matching protocol
- Pattern matching on encrypted streams
- Outsourced pattern matching
- Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer
This page was built for publication: 5PM: secure pattern matching
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2912798)