Poshida, a protocol for private information retrieval
暂无分享,去创建一个
[1] Alexandre Viejo,et al. Using social networks to distort users' profiles generated by web search engines , 2010, Comput. Networks.
[2] Douglas R. Stinson,et al. Extended combinatorial constructions for peer-to-peer user-private information retrieval , 2012, Adv. Math. Commun..
[3] Avi Arampatzis,et al. Versatile Query Scrambling for Private Web Search , 2015, Information Retrieval Journal.
[4] Lihua Liu,et al. An Improved Lindell-Waisbard Private Web Search Scheme , 2016, Int. J. Netw. Secur..
[5] Josep Domingo-Ferrer,et al. User-private information retrieval based on a peer-to-peer community , 2009, Data Knowl. Eng..
[6] Alissa Cooper,et al. A survey of query log privacy-enhancing techniques from a policy perspective , 2008, TWEB.
[7] Josep Maria Mateo-Sanz,et al. Exploiting social networks to provide privacy in personalized web search , 2011, J. Syst. Softw..
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Maria Bras-Amorós,et al. Optimal configurations for peer-to-peer user-private information retrieval , 2010, Comput. Math. Appl..
[10] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[11] Susan T. Dumais,et al. Designing Human-Readable User Profiles for Search Evaluation , 2013, ECIR.
[12] Micah Adler,et al. The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.
[13] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[14] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[15] Joan Feigenbaum,et al. Private web search , 2007, WPES '07.
[16] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[17] Yehuda Lindell,et al. Private Web Search with Malicious Adversaries , 2010, Privacy Enhancing Technologies.
[18] Balachander Krishnamurthy,et al. Measuring personalization of web search , 2013, WWW.
[19] Jordi Castellà-Roca,et al. Distributed system for private web search with untrusted partners , 2014, Comput. Networks.
[20] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[21] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[22] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .
[23] Darko Kirovski,et al. Towards improving the online shopping experience: A client-based platform for post-processing Web search results , 2012, Web Intell. Agent Syst..
[24] Srdjan Capkun,et al. Quantifying Web-Search Privacy , 2014, CCS.
[25] Jordi Herrera-Joancomartí,et al. Preserving user's privacy in web search engines , 2009, Comput. Commun..