BibTeX record journals/joc/HazayN12

download as .bib file

@article{DBLP:journals/joc/HazayN12,
  author    = {Carmit Hazay and
               Kobbi Nissim},
  title     = {Efficient Set Operations in the Presence of Malicious Adversaries},
  journal   = {J. Cryptology},
  volume    = {25},
  number    = {3},
  pages     = {383--433},
  year      = {2012},
  url       = {https://doi.org/10.1007/s00145-011-9098-x},
  doi       = {10.1007/s00145-011-9098-x},
  timestamp = {Thu, 18 May 2017 09:52:09 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/HazayN12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier