Secure two party comparison over encrypted data | IEEE Conference Publication | IEEE Xplore