-
3
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
LNCS Springer Verlag
-
Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication, LNCS Springer Verlag, Advances in Cryptology- EUROCRYPT'99, 1592, p. 402-414, 1999.
-
(1999)
Advances in Cryptology- EUROCRYPT'99
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
5
-
-
0029541045
-
Private information retrieval
-
IEEE
-
Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval, In Proceedings of the 36th annual symposium on foundations of computer science, IEEE, p. 41-51, 1995.
-
(1995)
Proceedings of the 36th Annual Symposium on Foundations of Computer Science
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
6
-
-
1442303741
-
The role of dynamic capabilities in e-business transformation
-
EM Daniel, and HN Wilson The role of dynamic capabilities in e-business transformation European Journal of Information Systems 4 12 2003 282 296
-
(2003)
European Journal of Information Systems
, vol.4
, Issue.12
, pp. 282-296
-
-
Daniel, E.M.1
Wilson, H.N.2
-
7
-
-
70349459300
-
Cloud computing
-
MD Dikaiakos, D Katsaros, G Pallis, A Vakali, and P Mehra Cloud computing IEEE Internet Computing 12 5 2009 10 13
-
(2009)
IEEE Internet Computing
, vol.12
, Issue.5
, pp. 10-13
-
-
Dikaiakos, M.D.1
Katsaros, D.2
Pallis, G.3
Vakali, A.4
Mehra, P.5
-
8
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Gertner Y, Ishai Y, Kushilevitz E. Protecting data privacy in private information retrieval schemes, In Proceedings of the 30th annual ACM symposium on theory of computing, ACM, p. 151-160, 1998.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing, ACM
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
-
12
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
IEEE
-
Kusilevitz E, Ostrovsky R. Replication is not needed: single database, computationally-private information retrieval, In Proceedings of the 38th annual symposium on foundations of computer science, IEEE, p. 364-373, 1997.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science
, pp. 364-373
-
-
Kusilevitz, E.1
Ostrovsky, R.2
-
15
-
-
80052798484
-
-
Technical report. Microsoft Research May
-
Popa RA, lorch JR, Molnar D, Wang HJ, Zhuang L, Enabling security in cloud storage SLAs with cloudproof. Technical report. Microsoft Research May 2010.
-
(2010)
Enabling Security in Cloud Storage SLAs with Cloudproof
-
-
Popa, R.A.1
Lorch, J.R.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
17
-
-
79251600218
-
A secure dynamic identity based authentication protocol for multi-server architecture
-
SK Sood, AK Sarje, and K Singh A secure dynamic identity based authentication protocol for multi-server architecture Journal of Network and Computer Applications 34 2 2011 609 618
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.2
, pp. 609-618
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
18
-
-
84867538058
-
Secure ranked keyword search over encrypted cloud data
-
C Wang, N Cao, J Li, K Ren, and W Lou Secure ranked keyword search over encrypted cloud data Journal of the ACM 43 3 2010 431 473
-
(2010)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
19
-
-
70449569012
-
Ensuring data storage security in cloud computing, quality of service
-
Wang C, Wang Q, Ren K, Lou W. Ensuring data storage security in cloud computing, quality of service, 2009, IWQoS IEEE 17th international workshop, p. 1-9, 2009.
-
(2009)
2009, IWQoS IEEE 17th International Workshop
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
|