Sciweavers

8972 search results - page 77 / 1795
» Private Information Retrieval
Sort
View
NDSS
2008
IEEE
15 years 5 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
P2P
2010
IEEE
132views Communications» more  P2P 2010»
14 years 9 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
SIGIR
2009
ACM
15 years 5 months ago
The ESA retrieval model revisited
Among the retrieval models that have been proposed in the last years, the ESA model of Gabrilovich and Markovitch received much attention. The authors report on a significant imp...
Maik Anderka, Benno Stein
ECUMN
2007
Springer
15 years 5 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
MDM
2007
Springer
15 years 5 months ago
Privacy (Regimes) Do Not Threaten Location Technology Development
Location technology allows for the tracking and tracing of individuals. Users may increasingly be concerned about the abilities of new technology to keep an eye on ones’ private...
Bastiaan van Loenen, Jaap Zevenbergen