Login / Signup
Private Information Retrieval Using Trusted Hardware.
Shuhong Wang
Xuhua Ding
Robert H. Deng
Feng Bao
Published in:
ESORICS (2006)
Keyphrases
</>
private information retrieval
trusted computing
low cost
real time
database
computer systems
privacy preserving
distributed environment
cryptographic protocols
user privacy
databases
web pages
third party
data objects
personal information