Sciweavers

242 search results - page 7 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
74
Voted
WISE
2002
Springer
15 years 2 months ago
Applying the Site Information to the Information Retrieval from the Web
In recent years, several information retrieval methods using information about the Web-links are developed, such as HITS and Trawling. In order to analyze the Web-links dividing i...
Yasuhito Asano, Hiroshi Imai, Masashi Toyoda, Masa...
ISMVL
2010
IEEE
221views Hardware» more  ISMVL 2010»
15 years 2 months ago
An Ontology Mediated Multimedia Information Retrieval System
We outline DL-Media, an ontology mediated multimedia information retrieval system, which combines logic-based retrieval with multimedia featurebased similarity retrieval. An ontolo...
Umberto Straccia
CCS
2009
ACM
15 years 4 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CC
2006
Springer
125views System Software» more  CC 2006»
14 years 9 months ago
A tight lower bound for restricted pir protocols
We show that any 1-round 2-server Private Information Retrieval Protocol where the answers are 1-bit long must ask questions that are at least n - 2 bits long, which is nearly equa...
Richard Beigel, Lance Fortnow, William I. Gasarch
CCS
2004
ACM
15 years 2 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon