Login / Signup
Private Information Retrieval Using Trusted Hardware.
Shuhong Wang
Xuhua Ding
Robert H. Deng
Feng Bao
Published in:
IACR Cryptol. ePrint Arch. (2006)
Keyphrases
</>
private information retrieval
trusted computing
low cost
cryptographic protocols
real time
peer to peer
computing environments
embedded systems
database
databases
web pages
website