-
1
-
-
0041089975
-
On hiding information from an oracle
-
ABADI, M., FEIGENBAUM, J., AND KILIAN, J. 1989. On hiding information from an oracle. J. Comput. Syst. Sci. 39, 1, 21-50.
-
(1989)
J. Comput. Syst. Sci.
, vol.39
, Issue.1
, pp. 21-50
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
2
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Dec.
-
ADAM, N., AND WORTMANN, J. 1989. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv. 21, 4 (Dec.), 515-556.
-
(1989)
ACM Comput. Surv.
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.1
Wortmann, J.2
-
3
-
-
84951063457
-
An upper bound on the communication complexity of private information retrieval
-
Proceedings of the 24th ICALP Springer-Verlag, New York
-
AMBAINIS, A. 1997. An upper bound on the communication complexity of private information retrieval. In Proceedings of the 24th ICALP. Lecture Notes in Computer Science, vol. 1256. Springer-Verlag, New York, pp. 401-407.
-
(1997)
Lecture Notes in Computer Science
, vol.1256
, pp. 401-407
-
-
Ambainis, A.1
-
4
-
-
21844513803
-
Simultaneous messages vs. communication
-
Proceedings of the Symposium on Theoretical Aspects in Computer Science (STACS). Springer-Verlag, New York
-
BABAI, L., KIMMEL, P., AND LOKAM, S. V. 1995. Simultaneous messages vs. communication. In Proceedings of the Symposium on Theoretical Aspects in Computer Science (STACS). Lecture Notes in Computer Science. Springer-Verlag, New York, pp. 361-372.
-
(1995)
Lecture Notes in Computer Science
, pp. 361-372
-
-
Babai, L.1
Kimmel, P.2
Lokam, S.V.3
-
5
-
-
33745511846
-
Hiding instances in multioracle queries
-
Proceedings of the STACS. Springer-Verlag, New York
-
BEAVER, D., AND FEIGENBAUM, J. 1990. Hiding instances in multioracle queries. In Proceedings of the STACS. Lecture Notes in Computer Science, vol. 415. Springer-Verlag, New York, pp. 37-48.
-
(1990)
Lecture Notes in Computer Science
, vol.415
, pp. 37-48
-
-
Beaver, D.1
Feigenbaum, J.2
-
6
-
-
84979502594
-
Security with low communication overhead
-
Proceedings of CRYPTO'90. Springer-Verlag, New York
-
BEAVER, D., FEIGENBAUM, J., KILIAN, J., AND ROGAWAY, P. 1991. Security with low communication overhead. In Proceedings of CRYPTO'90. Lecture Notes in Computer Sciences, vol. 537. Springer-Verlag, New York, pp. 62-76.
-
(1991)
Lecture Notes in Computer Sciences
, vol.537
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
7
-
-
0001870201
-
Locally random reductions: Improvements and applications
-
BEAVER, D., FEIGENBAUM, J., KILIAN, J., AND ROGAWAY, P. 1997. Locally random reductions: Improvements and applications. J. Crypt. 10, 1, 17-36.
-
(1997)
J. Crypt.
, vol.10
, Issue.1
, pp. 17-36
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
9
-
-
0022754707
-
Security problems on inference control for SUM, MAX, and MIN queries
-
July
-
CHIN, F. 1986. Security problems on inference control for SUM, MAX, and MIN queries. J. ACM 33, 3 (July), 451-464.
-
(1986)
J. ACM
, vol.33
, Issue.3
, pp. 451-464
-
-
Chin, F.1
-
10
-
-
0030645563
-
Computationally private information retrieval
-
(El Paso, Tex., May 4-6). ACM, New York
-
CHOR, B., AND GILBOA, N. 1997. Computationally private information retrieval. In Proceedings of the 29th Annual Symposium on the Theory of Computing (El Paso, Tex., May 4-6). ACM, New York, pp. 304-313.
-
(1997)
Proceedings of the 29th Annual Symposium on the Theory of Computing
, pp. 304-313
-
-
Chor, B.1
Gilboa, N.2
-
11
-
-
0003701129
-
-
Tech. Rep. TR CS0917. Dept. Comput. Science. Technion, Israel
-
CHOR, B., GILBOA, N., AND NAOR, M. 1997. Private information retrieval by keywords. Tech. Rep. TR CS0917. Dept. Comput. Science. Technion, Israel.
-
(1997)
Private Information Retrieval by Keywords
-
-
Chor, B.1
Gilboa, N.2
Naor, M.3
-
12
-
-
0029541045
-
Private information retrieval
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
CHOR, B., GOLDREICH, O., KUSHILEVITZ, E., AND SUDAN, M. 1995. Private information retrieval. In Proceedings of the 36th Annual Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, Calif., pp. 41-50.
-
(1995)
Proceedings of the 36th Annual Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
14
-
-
0018444418
-
Secure databases: Protection against user influence
-
Mar.
-
DOBKIN, D., JONES, A. K., AND LIPTON, R. J. 1979. Secure databases: Protection against user influence. ACM Trans. Datab. Syst. 4, 1 (Mar.), 97-106.
-
(1979)
ACM Trans. Datab. Syst.
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.K.2
Lipton, R.J.3
-
15
-
-
26444491386
-
On the power of two-local random reductions
-
FORTNOW, L., AND SZEGEDY, M. 1992. On the power of two-local random reductions. Inf. Proc. Lett. 44, 6, 303-306.
-
(1992)
Inf. Proc. Lett.
, vol.44
, Issue.6
, pp. 303-306
-
-
Fortnow, L.1
Szegedy, M.2
-
17
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
(Dallas, Tex., May 23-26). ACM, New York
-
GERTNER, Y., ISHAI, Y., KUSHILEVITZ, E., AND MALKIN, T. 1998. Protecting data privacy in private information retrieval schemes. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (Dallas, Tex., May 23-26). ACM, New York, pp. 151-160.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
18
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
May
-
GOLDREICH, O., AND OSTROVSKY, R. 1996. Software protection and simulation on oblivious RAMs. J. ACM 43, 3 (May), 431-473.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
19
-
-
0026121387
-
Modified bounds for covering codes
-
HONKALA, I. S. 1991. Modified bounds for covering codes. IEEE Trans. Inf. Theory 37, 2, 351-365.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.2
, pp. 351-365
-
-
Honkala, I.S.1
-
20
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
KUSHILEVITZ, E., AND OSTROVSKY, R. 1997. Replication is not needed: Single database, computationally-private information retrieval. In Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, Calif., pp. 364-373.
-
(1997)
Proceedings of the 38th Symposium on Foundations of Computer Science
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
21
-
-
0030714231
-
Private information storage
-
(El Paso, Tex., May 4-6). ACM, New York
-
OSTROVSKY, R., AND SHOUP, V. 1997. Private information storage. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing (El Paso, Tex., May 4-6). ACM, New York, pp. 294-303.
-
(1997)
Proceedings of the 29th Annual ACM Symposium on Theory of Computing
, pp. 294-303
-
-
Ostrovsky, R.1
Shoup, V.2
-
22
-
-
0027308412
-
Modified ranks of tensors and the size of circuits
-
(San Diego, Calif., May 16-18). ACM, New York
-
PUDLÁK, P., AND RÖDL, V. 1993. Modified ranks of tensors and the size of circuits. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing (San Diego, Calif., May 16-18). ACM, New York, pp. 523-531.
-
(1993)
Proceedings of the 25th Annual ACM Symposium on Theory of Computing
, pp. 523-531
-
-
Pudlák, P.1
Rödl, V.2
-
23
-
-
0000362179
-
Boolean, circuits, tensor ranks, and communication complexity
-
PUDLÁK, P., RÖDL, V., AND SGALL, J. 1997. Boolean, circuits, tensor ranks, and communication complexity. SICOMP 26, 605-633.
-
(1997)
SICOMP
, vol.26
, pp. 605-633
-
-
Pudlák, P.1
Rödl, V.2
Sgall, J.3
-
24
-
-
84889202146
-
-
Private communication, quoted in the Acknowledgment section of ABADI, ET AL. [1989]
-
RIVEST, R. L. 1989. Private communication, quoted in the Acknowledgment section of ABADI, ET AL. [1989].
-
(1989)
-
-
Rivest, R.L.1
-
25
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, eds. Academic Press, Orlando, Fla.
-
RIVEST, R. L., ADLEMAN, L., AND DERTOUZOS, M. L. 1978. On data banks and privacy homomorphisms. In Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, eds. Academic Press, Orlando, Fla.
-
(1978)
Foundations of Secure Computation
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
26
-
-
0028393221
-
A modified random perturbation method for database security
-
Mar.
-
TENDICK, P., AND MATLOFF, N. 1994. A modified random perturbation method for database security. ACM Trans. Datab. Syst. 19, 1 (Mar.), 47-63.
-
(1994)
ACM Trans. Datab. Syst.
, vol.19
, Issue.1
, pp. 47-63
-
-
Tendick, P.1
Matloff, N.2
|