A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
For content level access, very often database needs the query as a sample image. However, the image may contain private information and hence the user does not wish to reveal the ...
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desire...