Research Article

2EPV-ApproCom: Enhanced Effective, Private, and Verifiable Approximate Similarity Computation with Server Aided over Scalable Datasets for IoT

Figure 8

Distribution of FNR with in Case II, and here assuming that the malicious server partially conducts the protocol with (a) and (b) .
(a)
(b)