Login / Signup
Fully Malicious Authenticated PIR.
Marian Dietz
Stefano Tessaro
Published in:
CRYPTO (9) (2024)
Keyphrases
</>
real time
data mining
databases
information retrieval
digital libraries
computer systems
authentication scheme
pre determined
malicious behavior
detect malicious