-
1
-
-
84951063457
-
Upper bound on the communication complexity of private information retrieval
-
th Int'l Colloquium on Automata, Languages and Programming (ICALP'97), Springer-Verlag, Bologna, Italy, July
-
th Int'l Colloquium on Automata, Languages and Programming (ICALP'97), LNCS, vol. 1256, Springer-Verlag, Bologna, Italy, July 1997, pp. 401-407.
-
(1997)
LNCS
, vol.1256
, pp. 401-407
-
-
Ambainis, A.1
-
2
-
-
33745511846
-
Hiding instances in multioracle queries
-
th Ann. Symposium on Theoretical Aspects of Computer Science (STACS'90), Rouen, France, Springer-Verlag, Feb
-
th Ann. Symposium on Theoretical Aspects of Computer Science (STACS'90), Rouen, France, LNCS, vol. 415, Springer-Verlag, Feb. 1990, pp. 37-48.
-
(1990)
LNCS
, vol.415
, pp. 37-48
-
-
Beaver, D.1
Feigenbaum, J.2
-
3
-
-
84879524288
-
Information-theoretic private information retrieval: A unified construction
-
th Int'l Colloquium on Automata, Languages and Programming (ICALP 2001), Crete, Greece, Springer-Verlag, July
-
th Int'l Colloquium on Automata, Languages and Programming (ICALP 2001), Crete, Greece, LNCS, vol. 2076, Springer-Verlag, July 2001, pp. 912-926.
-
(2001)
LNCS
, vol.2076
, pp. 912-926
-
-
Beimel, A.1
Ishai, Y.2
-
4
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Proc. Advances in Cryptology (EUROCRYPT '99), Prague, Czech Republic, Springer-Verlag, May
-
C. Cachin, S. Micali, and M. Stadler, "Computationally Private Information Retrieval with Polylogarithmic Communication", Proc. Advances in Cryptology (EUROCRYPT '99), Prague, Czech Republic, LNCS, vol. 1592, Springer-Verlag, May 1999, pp. 402-414.
-
(1999)
LNCS
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
5
-
-
0035789226
-
Distributing trust on the Internet
-
Goteborg, Sweden, July
-
C. Cachin, "Distributing trust on the Internet", Proc. 2001 Int'l Conf. Dependable Systems and Networks (DSN01), Goteborg, Sweden, July 2001, pp. 183-192.
-
(2001)
Proc. 2001 Int'l Conf. Dependable Systems and Networks (DSN01)
, pp. 183-192
-
-
Cachin, C.1
-
6
-
-
0003785721
-
-
tech. report MIT/LCS/TR-817, Laboratory for Computer Science, MIT, Cambridge, MA, USA, Jan
-
M. Castro. Practical Byzantine Fault Tolerance, tech. report MIT/LCS/TR-817, Laboratory for Computer Science, MIT, Cambridge, MA, USA, Jan. 2001.
-
(2001)
Practical Byzantine Fault Tolerance
-
-
Castro, M.1
-
7
-
-
0029541045
-
Private information retrieval
-
Milwaukee, Wisconsin, USA, 23-25 Oct
-
th Annual Symposium on Foundations of Computer Science (FOCS'95), Milwaukee, Wisconsin, USA, 23-25 Oct. 1995, pp. 41-51. Journal version: J. of the ACM, vol. 45, no. 6, 1998, pp. 965-981.
-
(1995)
th Annual Symposium on Foundations of Computer Science (FOCS'95)
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
8
-
-
0032201622
-
-
th Annual Symposium on Foundations of Computer Science (FOCS'95), Milwaukee, Wisconsin, USA, 23-25 Oct. 1995, pp. 41-51. Journal version: J. of the ACM, vol. 45, no. 6, 1998, pp. 965-981.
-
(1998)
Journal version: J. of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
-
9
-
-
0003701129
-
-
tech. report TR CS0917, Dept. Computer Science, Technion, Israel
-
B. Chor, N. Gilboa, and M. Naor, Private information retrieval by keywords, tech. report TR CS0917, Dept. Computer Science, Technion, Israel, 1997.
-
(1997)
Private information retrieval by keywords
-
-
Chor, B.1
Gilboa, N.2
Naor, M.3
-
10
-
-
0026155432
-
Intrusion tolerance in distributed computing systems
-
Oakland, California, USA, May
-
Y. Deswarte, L. Blain, and J.C. Fabre, "Intrusion Tolerance in Distributed Computing Systems", Proc. 1991 IEEE Symposium on Research in Security and Privacy, Oakland, California, USA, May 1991, pp. 110-121.
-
(1991)
Proc. 1991 IEEE Symposium on Research in Security and Privacy
, pp. 110-121
-
-
Deswarte, Y.1
Blain, L.2
Fabre, J.C.3
-
11
-
-
0022564904
-
Intrusion-tolerance using fine-grain fragmentation-scattering
-
Oakland, California, USA, April
-
J.M. Fray, Y. Deswarte, and D. Powell, "Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering", Proc. 1986 IEEE Symposium on Research in Security and Privacy, Oakland, California, USA, April 1986, pp. 194-201.
-
(1986)
Proc. 1986 IEEE Symposium on Research in Security and Privacy
, pp. 194-201
-
-
Fray, J.M.1
Deswarte, Y.2
Powell, D.3
-
12
-
-
84964528983
-
Survivable storage systems
-
Anaheim, CA, USA, June
-
G.R. Ganger, P.K. Khosla, M. Bakkaloglu, M.W. Bigrigg, G.R. Goodson, S. Oguz, V. Pandurangan, C.A.N. Soules, J.D. Strunk, J.J. Wylie, "Survivable Storage Systems", Proc. DARPA Information Survivability Conference and Exposition, Anaheim, CA, USA, June 2001, pp. 184-195.
-
(2001)
Proc. DARPA Information Survivability Conference and Exposition
, pp. 184-195
-
-
Ganger, G.R.1
Khosla, P.K.2
Bakkaloglu, M.3
Bigrigg, M.W.4
Goodson, G.R.5
Oguz, S.6
Pandurangan, V.7
Soules, C.A.N.8
Strunk, J.D.9
Wylie, J.J.10
-
16
-
-
84948954750
-
One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval
-
Proc. Advances in Cryptology (EUROCRYPT 2000), Springer-Verlag
-
E. Kushilevitz and R. Ostrovsky, "One-way Trapdoor Permutations are Sufficient for Non-Trivial Single-Server Private Information Retrieval", Proc. Advances in Cryptology (EUROCRYPT 2000), LNCS, vol. 1807, Springer-Verlag, 2000, pp. 104-121.
-
(2000)
LNCS
, vol.1807
, pp. 104-121
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
18
-
-
0035439055
-
Maintenance-free global data storage
-
Sept./Oct
-
S. Rhea, C. Wells, P. Eaton, D. Geels, B. Zhao, H. Weatherspoon, and J. Kubiatowicz, "Maintenance-Free Global Data Storage", IEEE Internet Computing, vol. 5, no. 5, Sept./Oct. 2001, pp 40-49.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.5
, pp. 40-49
-
-
Rhea, S.1
Wells, C.2
Eaton, P.3
Geels, D.4
Zhao, B.5
Weatherspoon, H.6
Kubiatowicz, J.7
-
19
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret", Communications of the ACM, vol. 22, no. 11, 1979, pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
0024141971
-
How to share a secret with cheaters
-
M. Tompa and H. Woll, "How to Share a Secret with Cheaters", J. of Cryptography, vol. 1, no. 2, 1988, pp. 133-138.
-
(1988)
J. of Cryptography
, vol.1
, Issue.2
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
21
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
Goteborg, Sweden, July
-
C. Wang, J. Davidson, J. Hill, and J. Knight, "Protection of Software-Based Survivability Mechanisms", Proc. 2001 Int'l Conf. Dependable Systems and Networks (DSN01), Goteborg, Sweden, July 2001, pp. 193-202.
-
(2001)
Proc. 2001 Int'l Conf. Dependable Systems and Networks (DSN01)
, pp. 193-202
-
-
Wang, C.1
Davidson, J.2
Hill, J.3
Knight, J.4
-
23
-
-
0003515999
-
-
tech. report 2000-1828, Dept. Computer Science, Cornell University, Ithaca, N.Y., USA, Dec
-
L. Zhou, F.B. Schneider, and R. van Renesse, COCA: A Secure Distributed On-line Certification Authority, tech. report 2000-1828, Dept. Computer Science, Cornell University, Ithaca, N.Y., USA, Dec. 2000.
-
(2000)
COCA: A Secure Distributed On-line Certification Authority
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|