Sciweavers

242 search results - page 2 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
JOC
2007
93views more  JOC 2007»
13 years 4 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
COMPSAC
2002
IEEE
13 years 10 months ago
Private Information Retrieval in the Presence of Malicious Failures
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenge...
Erica Y. Yang, Jie Xu, Keith H. Bennett
WWW
2008
ACM
14 years 5 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
MDM
2007
Springer
123views Communications» more  MDM 2007»
13 years 11 months ago
Hiding Location Information from Location-Based Services
—In many existing location-based services, a service provider becomes aware of the location of its customers and can, maybe inadvertently, leak this information to unauthorized e...
Urs Hengartner
ICALP
2005
Springer
13 years 10 months ago
Single-Database Private Information Retrieval with Constant Communication Rate
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
Craig Gentry, Zulfikar Ramzan