Private information retrieval using trusted hardware
Abstract Many theoretical PIR (Private Information Retrieval) constructions have been
proposed in the past years. Though information theoretically secure, most of them are …
proposed in the past years. Though information theoretically secure, most of them are …
Cache cookies for browser authentication
A Juels, M Jakobsson, TN Jagatic - 2006 IEEE Symposium on …, 2006 - ieeexplore.ieee.org
Like conventional cookies, cache cookies are data objects that servers store in Web
browsers. Cache cookies, however, are unintentional byproducts of protocol design for …
browsers. Cache cookies, however, are unintentional byproducts of protocol design for …
[PDF][PDF] A practical solution to supporting oblivious basic operations on dynamic outsourced search trees
DT Khanh - International Journal of Computer Systems Science …, 2006 - dangtrankhanh.net
Search trees have played a fundamental and vital role in both traditional and modern
database application domains due to their efficiency in managing the storage and retrieval …
database application domains due to their efficiency in managing the storage and retrieval …
[PDF][PDF] Extreme Security Protocols for Outsourcing Database Services.
TK Dang - 2006 - Citeseer
Advances in networking technologies and the continued growth of the Internet have
triggered a new trend towards outsourcing data management and information technology …
triggered a new trend towards outsourcing data management and information technology …
基于可信计算的PIR
高利源, 倪佑生 - 计算机工程, 2006 - cqvip.com
基于可信计算的PIR-[维普官方网站]-www.cqvip.com-维普网 我的维普 购物车 充值 客服 首页 |
期刊大全 | 文献分类 | 优先出版 | 论文检测 | 论文选题 | 在线分享 | 会议平台 | 学术机构 您的位置 …
期刊大全 | 文献分类 | 优先出版 | 论文检测 | 论文选题 | 在线分享 | 会议平台 | 学术机构 您的位置 …
[图书][B] Semantic remote attestation
V Haldar - 2006 - search.proquest.com
Remote attestation is one of the core functionalities provided by trusted computing platforms.
It holds the promise of enabling a variety of novel applications. However, current techniques …
It holds the promise of enabling a variety of novel applications. However, current techniques …
Protecting privacy of health information through privacy broker
J Bhattacharya, SK Gupta… - Proceedings of the 39th …, 2006 - ieeexplore.ieee.org
Concerns about the protection of personally identifiable information are not unique to the
health care industry; however, consumers view their medical records as more" private" than …
health care industry; however, consumers view their medical records as more" private" than …
Constrained automata: a formal tool for ICT risk assessment
F Baiardi, F Martinelli, L Ricci… - … SCIENCE SERIES D …, 2006 - books.google.com
Conditional security assesses the security of an ICT system in a specifc context. A
fundamental step of this assessment determines the threats that can implement an attack …
fundamental step of this assessment determines the threats that can implement an attack …
A practical approach to secure Web services
Web services provide the potential to offer interoperability of distributed business-to-
business application integration between autonomous organisations, regardless of …
business application integration between autonomous organisations, regardless of …