Author:
Eaton Edward,Sasy Sajin,Goldberg Ian
Publisher
Springer International Publishing
Reference32 articles.
1. Aguilar Melchor, C., Barrier, J., Fousse, L., Killijian, M.: XPIR : private information retrieval for everyone. In: Proceedings on Privacy Enhancing Technologies (PoPETs). Sciendo (2016)
2. Angel, S., Chen, H., Laine, K., Setty, S.: PIR with compressed queries and amortized query processing. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P) (2018)
3. ARM. ARM Security Technology: Building a Secure System using TrustZone Technology (2015). https://developer.arm.com/documentation/PRD29-GENC-009492/c/TrustZone-Hardware-Architecture?lang=en
4. Lecture Notes in Computer Science;Z Brakerski,2011
5. Chor, B., Gilboa, N., Naor, M.: Private Information Retrieval by Keywords. Cryptology ePrint Archive, Report 1998/003 (1998). https://eprint.iacr.org/1998/003
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. HiddenTor: Toward a User-Centric and Private Query System for Tor BridgeDB;2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS);2024-07-23
2. Cell Manipulation Attack Against Onion Services;2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2023-12-17
3. Cybersecurity and privacy in smart bioprinting;Bioprinting;2023-12
4. On the Security of Rate-limited Privacy Pass;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. Tor network anonymity evaluation based on node anonymity;Cybersecurity;2023-11-08