Login / Signup
Private Information Retrieval in the Presence of Malicious Failures.
Erica Y. Yang
Jie Xu
Keith H. Bennett
Published in:
COMPSAC (2002)
Keyphrases
</>
private information retrieval
cryptographic protocols
object oriented
databases