Private information storage with logarithmic-space secure hardware
A Iliev, S Smith - … Security Management, Education and Privacy: IFIP …, 2004 - Springer
Abstract In Private Information Retrieval (PIR), a user obtains one of N records from a server,
without the server learning what record was requested. Recent research in “practical PIR” …
without the server learning what record was requested. Recent research in “practical PIR” …
Outbound authentication for programmable secure coprocessors
SW Smith - International Journal of Information Security, 2004 - Springer
A programmable secure coprocessor platform can help solve many security problems in
distributed computing, particularly if coprocessor applications can participate as full-fledged …
distributed computing, particularly if coprocessor applications can participate as full-fledged …
[PDF][PDF] Hiding Traversal of Tree Structured Data from Untrusted Data Stores.
P Lin, KS Candan - WOSIS, 2004 - academia.edu
With the increasing use of web services, many new challenges concerning data security are
becoming critical. Especially in mobile services, where clients are generally thin in terms of …
becoming critical. Especially in mobile services, where clients are generally thin in terms of …
Secure and privacy preserving outsourcing of tree structured data
P Lin, KS Candan - Secure Data Management: VLDB 2004 Workshop …, 2004 - Springer
With the increasing use of web services, many new challenges concerning data security are
becoming critical. Data or applications can now be outsourced to powerful remote servers …
becoming critical. Data or applications can now be outsourced to powerful remote servers …
Querying Databases Privately
D Asonov, JC Freytag - LECTURE NOTES IN COMPUTER SCIENCE., 2004 - Springer
People often retrieve information by querying databases. Designing databases that allow a
user to execute queries efficiently is a subject that has been investigated for decades, and is …
user to execute queries efficiently is a subject that has been investigated for decades, and is …
Blind sales in electronic commerce
E Aïmeur, G Brassard, FS Mani Onana - Proceedings of the 6th …, 2004 - dl.acm.org
We start with the usual paradigm in electronic commerce: a consumer who wants to buy from
a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining …
a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining …
Method and apparatus for secure processing of sensitive data
M Trapp, S Zwissler - 2004 - Google Patents
G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY
ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR …
ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR …