Compromising privacy in precise query protocols.
Jonathan L. Dautrich Jr.Chinya V. RavishankarPublished in: EDBT (2013)
Keyphrases
- database
- response time
- data sources
- keywords
- query expansion
- relevance feedback
- query processing
- query evaluation
- data structure
- security services
- user queries
- relational databases
- personal information
- authentication protocol
- secure multiparty computation
- private information retrieval
- cryptographic protocols
- security protocols
- multi party
- private information
- sensitive information
- result set
- database queries
- privacy preserving
- search engine
- information retrieval