Research Article
2EPV-ApproCom: Enhanced Effective, Private, and Verifiable Approximate Similarity Computation with Server Aided over Scalable Datasets for IoT
Figure 8
Distribution of FNR with in Case II, and here assuming that the malicious server partially conducts the protocol with (a) and (b) .
(a) |
(b) |