ONE (BLOCK) SIZE FITS ALL: PIR AND SPIR OVER ARBITRARY-LENGTH RECORDS VIA MULTI-BLOCK PIR QUERIES

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (20. : 2013 : San Diego, Calif.) Network and Distributed System Security Symposium 2013 (NDSS '13) ; Volume 2 of 2
1. Verfasser: Henry, Ryan (VerfasserIn)
Weitere Verfasser: Huang, Yizhou (VerfasserIn), Goldberg, Ian (VerfasserIn)
Pages:2013
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
INTENTION AND ORIGINATION: AN INSIDE LOOK AT LARGE-SCALE BOT QUERIES 2020 Zhang, Junjie
I WANT MY VOICE TO BE HEARD: IP OVER VOICE-OVER-IP FOR UNOBSERVABLE CENSORSHIP CIRCUMVENTION 2020 Houmansadr, Amir
OIRS: OUTSOURCED IMAGE RECOVERY SERVICE FROM COMPRESSIVE SENSING WITH PRIVACY ASSURANCE 2020 Wang, Cong
A FORMAL FRAMEWORK FOR NETWORK SECURITY DESIGN SYNTHESIS 2020 Rahman, Mohammad
MACROECONOMIC ANALYSIS OF MALWARE 2020 Garg, Vaibhav
YOU CAN'T DO TODAY'S SECURITY WITH YESTERDAY'S METHODS 2020 Sullivan, Joe
ONE BAD APPLE: BACKWARDS COMPATIBILITY ATTACKS ON STATE-OF-THE-ART CRYPTOGRAPHY 2020 Jager, Tibor
CLEAR AND PRESENT DATA: OPAQUE TRAFFIC AND ITS SECURITY IMPLICATIONS FOR THE FUTURE 2020 White, A. M.
TOWARD ONLINE VERIFICATION OF CLIENT BEHAVIOR IN DISTRIBUTED APPLICATIONS 2020 Cochran, Robert A.
PRIVACY-ENHANCING TECHNOLOGIES FOR MEDICAL TESTS USING GENOMIC DATA 2020 Ayday, Erman
TRANSFORMING AND TAMING PRIVACY-BREACHING ANDROID APPLICATIONS 2020 Zhang, Mu
A NON-INTERACTIVE DUAL CHANNEL AUTHENTICATION PROTOCOL FOR ASSURING PSUEDO-CONFIDENTTALITY 2020 Irakiza, David
RBRIDGE: USER REPUTATION BASED TOR BRIDGE DISTRIBUTION WITH PRIVACY PRESERVATION 2020 Wang, Qiyan
KINWRITE: HANDWRITING-BASED AUTHENTICATION USING KINECT 2020 Tian, Jing
SECURE COMPUTATION ON FLOATING POINT NUMBERS 2020 Aliasgari, Mehrdad
VERITO: A PRACTICAL SYSTEM FOR TRANSPARENCY AND ACCOUNTABILITY IN VIRTUAL ECONOMIES 2020 Bhaskar, Raghav
FIX ME UP: REPAIRING ACCESS-CONTROL BUGS IN WEB APPLICATIONS ............ 2020 Son, Sooel
LOW-COST STANDARD SIGNATURES IN WIRELESS SENSOR NETWORKS: A CASE FOR REVIVING PRE-COMPUTATION TECHNIQUES? 2020 Ateniese, Giuseppe
JUICE: A LONGITUDINAL STUDY OF AN SEO CAMPAIGN 2020 Wang, David Y.
PRACTICAL TIMING SIDE CHANNEL ATTACKS AGAINST KERNEL SPACE ASLR 2020 Hund, Ralf
Alle Artikel auflisten