Poshida II, a Multi Group Distributed Peer to Peer Protocol for Private Web Search
暂无分享,去创建一个
[1] Josep Maria Mateo-Sanz,et al. Exploiting social networks to provide privacy in personalized web search , 2011, J. Syst. Softw..
[2] Josep Domingo-Ferrer,et al. User-private information retrieval based on a peer-to-peer community , 2009, Data Knowl. Eng..
[3] Philippe A. Palanque,et al. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 2014, International Conference on Human Factors in Computing Systems.
[4] Alexandre Viejo,et al. Using social networks to distort users' profiles generated by web search engines , 2010, Comput. Networks.
[5] Muhammad Arshad Islam,et al. Revealing PIR protocols protected users , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Even Flood,et al. ODP, Open Directory Project , 2005 .
[8] Josep Maria Mateo-Sanz,et al. Design of a P2P network that protects users' privacy in front of Web Search Engines , 2015, Comput. Commun..
[9] Muhammad Arshad Islam,et al. Poshida, a protocol for private information retrieval , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).
[10] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[11] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[12] Yehuda Lindell,et al. Private Web Search with Malicious Adversaries , 2010, Privacy Enhancing Technologies.
[13] Shumeet Baluja,et al. A large scale study of wireless search behavior: Google mobile search , 2006, CHI.
[14] Susan T. Dumais,et al. Designing Human-Readable User Profiles for Search Evaluation , 2013, ECIR.
[15] Nitesh Saxena,et al. On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot , 2010, Privacy Enhancing Technologies.
[16] Jordi Castellà-Roca,et al. Distributed system for private web search with untrusted partners , 2014, Comput. Networks.
[17] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .
[18] Douglas R. Stinson,et al. Extended combinatorial constructions for peer-to-peer user-private information retrieval , 2012, Adv. Math. Commun..
[19] Avi Arampatzis,et al. Versatile Query Scrambling for Private Web Search , 2015, Information Retrieval Journal.
[20] Jordi Herrera-Joancomartí,et al. Preserving user's privacy in web search engines , 2009, Comput. Commun..