Scalable and private media consumption with Popcorn
We describe the design, implementation, and evaluation of Popcorn, a media delivery
system that hides clients' consumption (even from the content distributor). Popcorn relies on …
system that hides clients' consumption (even from the content distributor). Popcorn relies on …
Practical PIR for electronic commerce
R Henry, F Olumofin, I Goldberg - … of the 18th ACM conference on …, 2011 - dl.acm.org
We extend Goldberg's multi-server information-theoretic private information retrieval (PIR)
with a suite of protocols for privacy-preserving e-commerce. Our first protocol adds support …
with a suite of protocols for privacy-preserving e-commerce. Our first protocol adds support …
Dynamic database update in multi-server private information retrieval scheme
F Olumofin - US Patent 9,141,824, 2015 - Google Patents
A system and methods to provide updates of an oblivious database that is based on an
original database without compromising privacy guarantees, and without requiring a …
original database without compromising privacy guarantees, and without requiring a …
Practical private information retrieval
FG Olumofin - 2011 - uwspace.uwaterloo.ca
In recent years, the subject of online privacy has been attracting much interest, especially as
more Internet users than ever are beginning to care about the privacy of their online …
more Internet users than ever are beginning to care about the privacy of their online …
[PDF][PDF] Privacy-Preserving Access Control Mechanism for Incremental Data
V Avinash, S Sridhar, M Tech - academia.edu
Access control Mechanisms are security features that control how users and systems
communicate and interact with other systems and resources. Access control mechanisms …
communicate and interact with other systems and resources. Access control mechanisms …
Toward practical and private online services
T Gupta - 2017 - repositories.lib.utexas.edu
Today's common online services (social networks, media streaming, messaging, email, etc.)
bring convenience. However, these services are susceptible to privacy leaks. Certainly …
bring convenience. However, these services are susceptible to privacy leaks. Certainly …
[引用][C] A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data
P Bhingardeve, DH Kulkarni
[引用][C] Crucial aggregate cryptosystem regarding scalable facts giving in foriegn safe-keeping
K Mada, A Professo