Private information storage with logarithmic-space secure hardware

A Iliev, S Smith - … Security Management, Education and Privacy: IFIP …, 2004 - Springer
Abstract In Private Information Retrieval (PIR), a user obtains one of N records from a server,
without the server learning what record was requested. Recent research in “practical PIR” …

Outbound authentication for programmable secure coprocessors

SW Smith - International Journal of Information Security, 2004 - Springer
A programmable secure coprocessor platform can help solve many security problems in
distributed computing, particularly if coprocessor applications can participate as full-fledged …

[PDF][PDF] Hiding Traversal of Tree Structured Data from Untrusted Data Stores.

P Lin, KS Candan - WOSIS, 2004 - academia.edu
With the increasing use of web services, many new challenges concerning data security are
becoming critical. Especially in mobile services, where clients are generally thin in terms of …

Secure and privacy preserving outsourcing of tree structured data

P Lin, KS Candan - Secure Data Management: VLDB 2004 Workshop …, 2004 - Springer
With the increasing use of web services, many new challenges concerning data security are
becoming critical. Data or applications can now be outsourced to powerful remote servers …

Querying Databases Privately

D Asonov, JC Freytag - LECTURE NOTES IN COMPUTER SCIENCE., 2004 - Springer
People often retrieve information by querying databases. Designing databases that allow a
user to execute queries efficiently is a subject that has been investigated for decades, and is …

Blind sales in electronic commerce

E Aïmeur, G Brassard, FS Mani Onana - Proceedings of the 6th …, 2004 - dl.acm.org
We start with the usual paradigm in electronic commerce: a consumer who wants to buy from
a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining …

Method and apparatus for secure processing of sensitive data

M Trapp, S Zwissler - 2004 - Google Patents
G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY
ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR …

[引用][C] Privacy broker for enforcing privacy policies in databases

J Bhattacharya, SK Gupta - Proceedings of Fifth international conference on …, 2004

[引用][C] Extreme Security Protocols for Outsourcing Database Services.

TK Dang - iiWAS, 2004