Private information retrieval
Top Cited Papers
- 19 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Algebraic methods for interactive proof systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A modified random perturbation method for database securityACM Transactions on Database Systems, 1994
- Non-deterministic exponential time has two-prover interactive protocolscomputational complexity, 1991
- Modified bounds for covering codesIEEE Transactions on Information Theory, 1991
- Checking computations in polylogarithmic timePublished by Association for Computing Machinery (ACM) ,1991
- Hiding instances in multioracle queriesPublished by Springer Nature ,1990
- Security-control methods for statistical databases: a comparative studyACM Computing Surveys, 1989
- On hiding information from an oracleJournal of Computer and System Sciences, 1989
- Security problems on inference control for SUM, MAX, and MIN queriesJournal of the ACM, 1986
- Secure databasesACM Transactions on Database Systems, 1979