Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference19 articles.
1. Bowers KD, Juels A, Oprea A. Proofs of retrievability: theory and implementation, Cryptology e-Print Archive. Report 2008/175; 2008a.
2. Bowers KD, Juels A, Oprea A. HAIL: a high-availability and integrity layer for cloud storage, Cryptology e-Print Archive. Report 2008/489, 2008b.
3. Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication, LNCS Springer Verlag, Advances in Cryptology- EUROCRYPT’99, 1592, p. 402–414, 1999.
4. Chor B, Gilboa N, Naor M. Private information retrieval by keywords. Report 98-03. Theory of Cryptography Library, 1998.
5. Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval, In Proceedings of the 36th annual symposium on foundations of computer science, IEEE, p. 41–51, 1995.
Cited by
119 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献