Login / Signup

Private Information Retrieval in the Presence of Malicious Failures.

Erica Y. YangJie XuKeith H. Bennett
Published in: COMPSAC (2002)
Keyphrases
  • private information retrieval
  • cryptographic protocols
  • object oriented
  • databases