메뉴 건너뛰기




Volumn , Issue , 2008, Pages

The practicality of the keyword search using PIR

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS PATTERNS; COMPUTATIONAL COSTS; ELECTRONIC FILES; EVALUATION RESULTS; HOTMAIL; KEYWORD SEARCH; LATEST TECHNOLOGY; OPEN PROBLEMS; PRIVACY PRESERVING; PRIVATE INFORMATION; PRIVATE INFORMATION RETRIEVAL; PUBLIC KEY INFRASTRUCTURE; PUBLIC-KEY ENCRYPTION;

EID: 77951133304     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISITA.2008.4895559     Document Type: Conference Paper
Times cited : (6)

References (11)
  • 6
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuousity classes
    • Proceedings of Eurocrypto 99
    • P.Paillier, "Public-key cryptosystems based on composite degree residuousity classes", Proceedings of Eurocrypto 99, LNCS 1592 : pp223-238.
    • LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 7
    • 33645970169 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared communication
    • The 8th Information Security Conference(ISC)
    • H.Lipmaa, "An Oblivious Transfer Protocol with Log-Squared Communication", The 8th Information Security Conference(ISC), volume 3650 of LNCS, pp.314-328, 2005.
    • (2005) LNCS , vol.3650 , pp. 314-328
    • Lipmaa, H.1
  • 8
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • B.Bloom, "Space/time trade-offs in hash coding with allowable errors", Communications of the ACM, pages 13(7):422-426, July 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.