Practical Private Information Retrieval
暂无分享,去创建一个
[1] Stephen S. Yau,et al. Controlled privacy preserving keyword search , 2008, ASIACCS '08.
[2] Katherine A. Heller,et al. Bayesian hierarchical clustering , 2005, ICML.
[3] Helger Lipmaa,et al. An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.
[4] George Danezis,et al. Denial of service or denial of security? , 2007, CCS '07.
[5] Peishun Wang,et al. Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing , 2010, AISC.
[6] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[7] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[8] Sergey Yekhanin,et al. Private information retrieval , 2010, CACM.
[9] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[10] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[11] R. Lippmann,et al. An introduction to computing with neural nets , 1987, IEEE ASSP Magazine.
[12] Joonsang Baek,et al. On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search , 2006, ISC.
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] Stefan Richter,et al. NISAN: network information service for anonymization networks , 2009, CCS.
[15] Martin Dietzfelbinger,et al. Hash, Displace, and Compress , 2009, ESA.
[16] Ian Goldberg,et al. Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.
[17] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[18] Amos Beimel,et al. Robust Information-Theoretic Private Information Retrieval , 2002, Journal of Cryptology.
[19] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[20] Philippe Gaborit,et al. A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol , 2007, IACR Cryptol. ePrint Arch..
[21] David A. Landgrebe,et al. A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..
[22] Rafail Ostrovsky,et al. Batch codes and their applications , 2004, STOC '04.
[23] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[24] Carmela Troncoso,et al. Scalable Anonymous Communication with Provable Security , 2010, HotSec.
[25] Sergey Yekhanin,et al. Locally Decodable Codes: A Brief Survey , 2011, IWCC.
[26] Nivio Ziviani,et al. External perfect hashing for very large key sets , 2007, CIKM '07.
[27] Radu Sion,et al. On the Practicality of Private Information Retrieval , 2007, NDSS.
[28] Rafail Ostrovsky,et al. Private Searching on Streaming Data , 2005, Journal of Cryptology.
[29] Nikita Borisov,et al. Breaking the Collusion Detection Mechanism of MorphMix , 2006, Privacy Enhancing Technologies.
[30] Sean W. Smith,et al. Protecting client privacy with trusted computing at the server , 2005, IEEE Security & Privacy Magazine.
[31] Jeffrey Scott Vitter,et al. Implementing I/O-efficient Data Structures Using TPIE , 2002, ESA.
[32] Ian Goldberg,et al. Privacy-Preserving Queries over Relational Databases , 2010, Privacy Enhancing Technologies.
[33] Steve Kopp,et al. Understanding Map Projections , 2001 .
[34] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[35] Yuval Ishai,et al. Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing , 2004, Journal of Cryptology.
[36] Nitesh Saxena,et al. On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot , 2010, Privacy Enhancing Technologies.
[37] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[38] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[39] Philippe Gaborit,et al. High-Speed Private Information Retrieval Computation on GPU , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[40] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[41] Yves Deswarte,et al. Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases , 2006, Privacy in Statistical Databases.
[42] Jan Camenisch,et al. Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..
[43] Ari Juels,et al. Targeted Advertising ... And Privacy Too , 2001, CT-RSA.
[44] Siu-Ming Yiu,et al. Oblivious Transfer with Access Control : Realizing Disjunction without Duplication , 2010, Pairing.
[45] Craig Gentry,et al. Single-Database Private Information Retrieval with Constant Communication Rate , 2005, ICALP.
[46] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[47] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[48] Prateek Mittal,et al. In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems , 2010, CCS '10.
[49] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[50] Carmela Troncoso,et al. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval , 2011, USENIX Security Symposium.
[51] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[52] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[53] Jitender S. Deogun,et al. The smart phones of tomorrow , 2008, SIGBED.
[54] Jan Camenisch,et al. Endorsed E-Cash , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[55] Sean W. Smith,et al. Private Information Storage with Logarithm-Space Secure Hardware , 2004, International Information Security Workshops.
[56] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[57] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[58] Urs Hengartner. Location privacy based on trusted computing and secure logging , 2008, SecureComm.
[59] Yi Mu,et al. Constant-Size Dynamic k-TAA , 2006, SCN.
[60] Prateek Mittal,et al. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies , 2009, CCS.
[61] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[62] Radu Sion,et al. On the Computational Practicality of Private Information Retrieval , 2006 .
[63] Felipe Saint-Jean. Java Implementation of a Single-Database Computationally Symmetric Private Information Retrieval (cSPIR) Protocol , 2005 .
[64] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[65] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[66] Tal Malkin,et al. A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication , 1998, RANDOM.
[67] Robert H. Deng,et al. Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..
[68] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[69] Johann-Christoph Freytag,et al. Almost Optimal Private Information Retrieval , 2002, Privacy Enhancing Technologies.
[70] Vandana Gunupudi,et al. Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents , 2008, Financial Cryptography.
[71] Helen Nissenbaum,et al. Adnostic: Privacy Preserving Targeted Advertising , 2010, NDSS.
[72] Ian Goldberg,et al. Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.
[73] Daniel J. Solove,et al. Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .
[74] Sanjeev Kumar Mishra. On Symmetrically Private Information Retrieval , 2000, IACR Cryptol. ePrint Arch..
[75] Ying Cai,et al. Location anonymity in continuous location-based services , 2007, GIS.
[76] Matthew Green,et al. Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.
[77] Matthew Richardson,et al. Targeted, Not Tracked: Client-Side Solutions for Privacy-Friendly Behavioral Advertising , 2011 .
[78] Thomas Schneider,et al. Engineering Secure Two-Party Computation Protocols , 2012, Springer Berlin Heidelberg.
[79] Andris Ambainis,et al. On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .
[80] Nicholas Hopper,et al. Balancing the shadows , 2010, WPES '10.
[81] Xiaomin Liu,et al. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection , 2009, TCC.
[82] Nick Mathewson,et al. The pynchon gate: a secure method of pseudonymous mail retrieval , 2005, WPES '05.
[83] Karen Sparck Jones. A statistical interpretation of term specificity and its application in retrieval , 1972 .
[84] Ian Goldberg,et al. Practical PIR for electronic commerce , 2011, CCS '11.
[85] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[86] Nikita Borisov,et al. A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.
[87] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[88] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[89] Klim Efremenko,et al. 3-Query Locally Decodable Codes of Subexponential Length , 2008 .
[90] Marco Gruteser,et al. USENIX Association , 1992 .
[91] Rafail Ostrovsky,et al. Multi-Server Oblivious RAM , 2011, IACR Cryptol. ePrint Arch..
[92] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.
[93] Radu Sion,et al. On securing untrusted clouds with cryptography , 2010, WPES '10.
[94] Ian Goldberg,et al. Improving the Robustness of Private Information Retrieval , 2007 .
[95] Roopa Vishwanathan,et al. Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology , 2009, DBSec.
[96] Nicholas Hopper,et al. Hashing it out in public: common failure modes of DHT-based anonymity schemes , 2009, WPES '09.
[97] A. Khoshgozaran,et al. SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.
[98] Urs Hengartner,et al. A Distributed k-Anonymity Protocol for Location Privacy , 2009, PerCom.
[99] Sergey Yekhanin,et al. Locally Decodable Codes and Private Information Retrieval Schemes , 2010, Information Security and Cryptography.
[100] Abraham Silberschatz,et al. Database System Concepts , 1980 .
[101] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[102] Christian Wieschebrink,et al. Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography , 2006, 2006 IEEE International Symposium on Information Theory.
[103] Philippe Gaborit,et al. A fast private information retrieval protocol , 2008, 2008 IEEE International Symposium on Information Theory.
[104] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[105] Security Rsa,et al. TWIRL and RSA Key Size , 2003 .
[106] Andy Parrish,et al. Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups , 2010, ISC.
[107] Dmitri Asonov. Querying Databases Privately: A New Approach to Private Information Retrieval , 2004, Lecture Notes in Computer Science.
[108] Ian Goldberg,et al. Achieving Efficient Query Privacy for Location Based Services , 2010, Privacy Enhancing Technologies.
[109] Salvatore J. Stolfo,et al. Privacy-Preserving Sharing of Sensitive Information , 2010, IEEE Secur. Priv..
[110] Yang Cui,et al. The practicality of the keyword search using PIR , 2008, 2008 International Symposium on Information Theory and Its Applications.
[111] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[112] Bruce W. Weide,et al. Using parse tree validation to prevent SQL injection attacks , 2005, SEM '05.
[113] Matthew K. Wright,et al. Salsa: a structured approach to large-scale anonymity , 2006, CCS '06.
[114] Sergey Yekhanin,et al. Towards 3-query locally decodable codes of subexponential length , 2008, JACM.
[115] Elisa Bertino,et al. Position transformation: a location privacy protection method for moving objects , 2008, SPRINGL '08.
[116] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[117] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[118] Sean W. Smith,et al. Practical server privacy with secure coprocessors , 2001, IBM Syst. J..
[119] Alfred Kobsa,et al. Tailoring Privacy to Users' Needs , 2001, User Modeling.
[120] Robert H. Deng. Towards Practical Private Information Retrieval , 2006 .
[121] Hua Lu,et al. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[122] William I. Gasarch,et al. A Survey on Private Information Retrieval (Column: Computational Complexity) , 2004, Bull. EATCS.
[123] Divyakant Agrawal,et al. Generalizing PIR for Practical Private Retrieval of Public Data , 2010, DBSec.
[124] Nicholas Hopper,et al. Scalable onion routing with torsk , 2009, CCS.
[125] Claudio Bettini,et al. Privacy in Georeferenced Context-aware Services: A Survey , 2009, PiLBA.
[126] Urs Hengartner,et al. Hiding Location Information from Location-Based Services , 2007, 2007 International Conference on Mobile Data Management.
[127] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[128] Saikat Guha,et al. Privad: Practical Privacy in Online Advertising , 2011, NSDI.
[129] Brent Waters,et al. New Techniques for Private Stream Searching , 2009, TSEC.
[130] Bernhard Plattner,et al. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.
[131] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.