Last update: Sun Jan 6 02:01:01 MST 2019
@Article{Jarrous:2013:SCF, author = "Ayman Jarrous and Benny Pinkas", title = "Secure computation of functionalities based on {Hamming} distance and its application to computing document similarity", journal = j-INT-J-APPL-CRYPTOGR, volume = "3", number = "1", pages = "21--46", year = "2013", CODEN = "????", DOI = "https://doi.org/10.1504/IJACT.2013.053433", ISSN = "1753-0563 (print), 1753-0571 (electronic)", ISSN-L = "1753-0563", MRclass = "94A60", MRnumber = "3112628", MRreviewer = "Aldar C.-F. Chan", bibdate = "Fri Mar 17 10:02:54 2017", bibsource = "http://www.math.utah.edu/pub/tex/bib/ijact.bib", acknowledgement = ack-nhfb, fjournal = "International Journal of Applied Cryptography. IJACT", journal-URL = "http://www.inderscienceonline.com/loi/ijact", }