Controlling data disclosure in computational PIR protocols

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
Pages310-313
Number of pages4
DOIs
StatePublished - 2010
Event5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010 - Beijing, China
Duration: Apr 13 2010Apr 16 2010

Publication series

NameProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010

Conference

Conference5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
Country/TerritoryChina
CityBeijing
Period4/13/104/16/10

ASJC Scopus Subject Areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Keywords

  • data disclosure
  • oblivious transfer
  • private information retrieval

Fingerprint

Dive into the research topics of 'Controlling data disclosure in computational PIR protocols'. Together they form a unique fingerprint.

Cite this