Author:
Lazzaretti Arthur,Papamanthou Charalampos
Publisher
Springer Nature Switzerland
Reference41 articles.
1. Angel, S., Chen, H., Laine, K., Setty, S.: PIR with compressed queries and amortized query processing. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 962–979 (2018). https://doi.org/10.1109/SP.2018.00062. ISSN: 2375-1207
2. Angel, S., Setty, S.: Unobservable communication over fully untrusted infrastructure. In: Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation, pp. 551–569. OSDI2016, USENIX Association, USA (2016)
3. Backes, M., Kate, A., Maffei, M., Pecina, K.: ObliviAd: provably secure and practical online behavioral advertising. In: 2012 IEEE Symposium on Security and Privacy, pp. 257–271 (2012). https://doi.org/10.1109/SP.2012.25. ISSN: 2375-1207
4. Lecture Notes in Computer Science;A Beimel,2001
5. Lecture Notes in Computer Science;A Beimel,2000