Private Information Retrieval Using Trusted Hardware
From MaRDI portal
Publication:5862520
DOI10.1007/11863908_4zbMath1487.68094OpenAlexW1878874188MaRDI QIDQ5862520
Feng Bao, Robert H. Deng, Xuhua Ding, Shu-Hong Wang
Publication date: 9 March 2022
Published in: Computer Security – ESORICS 2006 (Search for Journal in Brave)
Full work available at URL: https://ink.library.smu.edu.sg/sis_research/567
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Private information retrieval
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Software protection and simulation on oblivious RAMs
- Advances in Cryptology - CRYPTO 2003
- Information Security
- A Permutation Network
- Symmetric Ternary Switching Functions: Their Detection and Realization with Threshold Logic
This page was built for publication: Private Information Retrieval Using Trusted Hardware