BibTeX record journals/joc/HazayN12

download as .bib file

@article{DBLP:journals/joc/HazayN12,
  author       = {Carmit Hazay and
                  Kobbi Nissim},
  title        = {Efficient Set Operations in the Presence of Malicious Adversaries},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {3},
  pages        = {383--433},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-011-9098-x},
  doi          = {10.1007/S00145-011-9098-X},
  timestamp    = {Fri, 18 Sep 2020 11:17:34 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics