Login / Signup
On the Capacity of Leaky Private Information Retrieval.
Islam Samy
Ravi Tandon
Loukas Lazos
Published in:
ISIT (2019)
Keyphrases
</>
private information retrieval
cryptographic protocols
peer to peer
privacy preserving
database
multimedia