Skip to main content
. 2009 Aug 25;9:41. doi: 10.1186/1472-6947-9-41

Figure 1.

Figure 1

Example of the use of two Bloom filters for the privacy-preserving computation of string similarities.