Sciweavers

340 search results - page 22 / 68
» Computationally Private Information Retrieval with Polylogar...
Sort
View
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 5 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers â...
Yanbin Lu, Gene Tsudik
NDSS
2008
IEEE
14 years 1 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
ICDCSW
2002
IEEE
13 years 11 months ago
Persistent Cache in Cooperative Search Engine
Cooperative Search Engine (CSE) is a distributed search engine, which can update indexes in very short time for the purpose of fresh information retrieval. In CSE, the retrieval p...
Nobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai, Hi...
HPCN
2000
Springer
13 years 10 months ago
Communicating Mobile Active Objects in Java
This paper investigates the design and implementation of mobile computations in Java. We discuss various issues encountered while building a Java library that allows active objects...
Françoise Baude, Denis Caromel, Fabrice Hue...
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
14 years 3 months ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl