Private information retrieval using trusted hardware

S Wang, X Ding, RH Deng, F Bao - Computer Security–ESORICS 2006 …, 2006 - Springer
Abstract Many theoretical PIR (Private Information Retrieval) constructions have been
proposed in the past years. Though information theoretically secure, most of them are …

Sovereign joins

R Agrawal, D Asonov… - … Conference on Data …, 2006 - ieeexplore.ieee.org
We present a secure network service for sovereign information sharing whose only trusted
component is an off-theshelf secure coprocessor. The participating data providers send …

Cache cookies for browser authentication

A Juels, M Jakobsson, TN Jagatic - 2006 IEEE Symposium on …, 2006 - ieeexplore.ieee.org
Like conventional cookies, cache cookies are data objects that servers store in Web
browsers. Cache cookies, however, are unintentional byproducts of protocol design for …

[PDF][PDF] A practical solution to supporting oblivious basic operations on dynamic outsourced search trees

DT Khanh - International Journal of Computer Systems Science …, 2006 - dangtrankhanh.net
Search trees have played a fundamental and vital role in both traditional and modern
database application domains due to their efficiency in managing the storage and retrieval …

[PDF][PDF] Extreme Security Protocols for Outsourcing Database Services.

TK Dang - 2006 - Citeseer
Advances in networking technologies and the continued growth of the Internet have
triggered a new trend towards outsourcing data management and information technology …

基于可信计算的PIR

高利源, 倪佑生 - 计算机工程, 2006 - cqvip.com
基于可信计算的PIR-[维普官方网站]-www.cqvip.com-维普网  我的维普 购物车 充值 客服 首页 |
期刊大全 | 文献分类 | 优先出版 | 论文检测 | 论文选题 | 在线分享 | 会议平台 | 学术机构 您的位置 …

[图书][B] Semantic remote attestation

V Haldar - 2006 - search.proquest.com
Remote attestation is one of the core functionalities provided by trusted computing platforms.
It holds the promise of enabling a variety of novel applications. However, current techniques …

Protecting privacy of health information through privacy broker

J Bhattacharya, SK Gupta… - Proceedings of the 39th …, 2006 - ieeexplore.ieee.org
Concerns about the protection of personally identifiable information are not unique to the
health care industry; however, consumers view their medical records as more" private" than …

Constrained automata: a formal tool for ICT risk assessment

F Baiardi, F Martinelli, L Ricci… - … SCIENCE SERIES D …, 2006 - books.google.com
Conditional security assesses the security of an ICT system in a specifc context. A
fundamental step of this assessment determines the threats that can implement an attack …

A practical approach to secure Web services

J Xu, EY Yang, KH Bennett - Ninth IEEE International …, 2006 - ieeexplore.ieee.org
Web services provide the potential to offer interoperability of distributed business-to-
business application integration between autonomous organisations, regardless of …