Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Secure computation of functionalities based on Hamming distance and its application to computing document similarity
Ayman Jarrous; Benny Pinkas
International Journal of Applied Cryptography (IJACT), 2013 Vol.3 No.1, pp.21 - 46
5 - 3 =

Thank you for your feedback.