Repudiative information retrieval
暂无分享,去创建一个
[1] Alison L Gibbs,et al. On Choosing and Bounding Probability Metrics , 2002, math/0209021.
[2] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[3] Sean W. Smith,et al. Practical server privacy with secure coprocessors , 2001, IBM Syst. J..
[4] Paul F. Syverson,et al. Group Principals and the Formalization of Anonymity , 1999, World Congress on Formal Methods.
[5] Rafail Ostrovsky,et al. Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..
[6] Vitaly Shmatikov,et al. Probabilistic analysis of anonymity , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[7] Johann-Christoph Freytag,et al. Almost Optimal Private Information Retrieval , 2002, Privacy Enhancing Technologies.
[8] Markus Jakobsson,et al. Security of Signed ElGamal Encryption , 2000, ASIACRYPT.
[9] Dmitri Asonov. Private Information Retrieval – An Overview and Current Trends , 2001 .
[10] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[11] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[12] David R. Safford,et al. Practical Private Information Retrieval with Secure Coprocessors , 2000 .
[13] Robert H. Deng,et al. An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods , 2000, ICISC.
[14] Aggelos Kiayias,et al. Secure Games with Polynomial Expressions , 2001, ICALP.
[15] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[16] Johann-Christoph Freytag. Private Information Retrieval, Optimal for Users and Secure Coprocessors , 2002 .
[17] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[18] Sean W. Smith,et al. Using a High-Performance, Programmable Secure Coprocessor , 1998, Financial Cryptography.
[19] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.