Sciweavers

27 search results - page 1 / 6
» Private Information Retrieval in the Presence of Malicious F...
Sort
View
COMPSAC
2002
IEEE
13 years 9 months ago
Private Information Retrieval in the Presence of Malicious Failures
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenge...
Erica Y. Yang, Jie Xu, Keith H. Bennett
CSMR
2003
IEEE
13 years 10 months ago
Software Services and Software Maintenance
Software services are being promoted as the next big step forward in software engineering.. Inevitably, both service vendor and service client programs will require maintenance. W...
Keith H. Bennett, Jie Xu
JOC
2007
93views more  JOC 2007»
13 years 4 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
ACISP
2004
Springer
13 years 10 months ago
Single Database Private Information Retrieval with Logarithmic Communication
In this paper, we study the problem of single database private information retrieval, and present schemes with only logarithmic server-side communication complexity. Previously th...
Yan-Cheng Chang
ESORICS
2009
Springer
13 years 11 months ago
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
Abstract. The ubiquity of smartphones and other location-aware handheld devices has resulted in a dramatic increase in popularity of locationbased services (LBS) tailored to user l...
Ali Khoshgozaran, Cyrus Shahabi