Secure Cosine Similarity Computation with Malicious Adversaries
2013 ◽
Vol 5
(2)
◽
pp. 171-178
◽
2013 ◽
Vol 33
(6)
◽
pp. 1579-1581
◽
Keyword(s):
Keyword(s):