Login / Signup

Fully Malicious Authenticated PIR.

Marian DietzStefano Tessaro
Published in: CRYPTO (9) (2024)
Keyphrases
  • real time
  • data mining
  • databases
  • information retrieval
  • digital libraries
  • computer systems
  • authentication scheme
  • pre determined
  • malicious behavior
  • detect malicious