You are here

Bibliography

Export 15 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is private information retrieval  [Clear All Filters]
2017
Grothoff C. The GNUnet System. Informatique [Internet]. 2017 ;HDR:181. Available from: https://grothoff.org/christian/habil.pdf
2007
Sassaman L, Preneel B. The Byzantine Postman Problem: A Trivial Attack Against PIR-based Nym Servers. [Internet]. 2007 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.1013
Goldberg I. Improving the Robustness of Private Information Retrieval. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy. Proceedings of the 2007 IEEE Symposium on Security and Privacy. IEEE Computer Society Washington, DC, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1264203
Ostrovsky R, Skeith WE. Private Searching on Streaming Data. J. Cryptol. 2007 ;20:397–430.
Patterson ML, Sassaman L. Subliminal Channels in the Private Information Retrieval Protocols. In: Proceedings of the 28th Symposium on Information Theory in the Benelux. Proceedings of the 28th Symposium on Information Theory in the Benelux. Enschede,NL: Werkgemeenschap voor Informatie- en Communicatietheorie; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9190
2006
Ishai Y, Kushilevitz E, Ostrovsky R, Sahai A. Cryptography from Anonymity. Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06)-Volume 00 [Internet]. 2006 :239–248. Available from: http://portal.acm.org/citation.cfm?id=1170505
2005
Perng G, Reiter MK, Wang C. Censorship Resistance Revisited. In: Proceedings of Information Hiding Workshop (IH 2005). Proceedings of Information Hiding Workshop (IH 2005). Springer Berlin / Heidelberg; 2005. pp. 62–76. Available from: http://www.springerlink.com/content/f08707qw34614340/
Sassaman L, Cohen B, Mathewson N. The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005). Arlington, VA, USA: ACM New York, NY, USA; 2005. Available from: http://portal.acm.org/citation.cfm?id=1102199.1102201
2002
Beimel A, Ishai Y, Kushilevitz E, Raymond J-F. Breaking the $O(n^1/(2k-1))$ Barrier for Information-Theoretic Private Information Retrieval. In: Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS). Proceedings of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS). ; 2002. Available from: http://portal.acm.org/citation.cfm?id=652187
Beimel A, Stahl Y. Robust information-theoretic private information retrieval. In: Proceedings of the 3rd Conference on Security in Communication Networks. Vol. 2576. Proceedings of the 3rd Conference on Security in Communication Networks. Springer-Verlag; 2002. pp. 326–341. Available from: http://www.springerlink.com/content/9bnlbf2e2lp9u9p4/
Kesdogan D, Borning M, Schmeink M. Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?. In: Dingledine R, Syverson P Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482; 2002. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.7678
1998
Gertner Y, Goldwasser S, Malkin T. A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication. In: Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM '98). Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM '98). London, UK: Springer-Verlag; 1998. pp. 200–217. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.6742
1997
Chor B, Gilboa N. Computationally private information retrieval (extended abstract). In: Proceedings of the twenty-ninth annual ACM symposium on Theory of Computing (STOC '97). Proceedings of the twenty-ninth annual ACM symposium on Theory of Computing (STOC '97). El Paso, TX, United States: ACM Press; 1997. pp. 304–313. Available from: http://portal.acm.org/citation.cfm?id=258533.258609