Journal articles on the topic 'Private information retrieval (PIR)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Private information retrieval (PIR).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
ANDRIU, Adrian-Viorel. "PIR – Private Information Retrieval." Romanian Cyber Security Journal 4, no. 2 (2022): 65–70. http://dx.doi.org/10.54851/v4i2y202207.
Full textToledo, Raphael R., George Danezis, and Ian Goldberg. "Lower-Cost ∈-Private Information Retrieval." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (2016): 184–201. http://dx.doi.org/10.1515/popets-2016-0035.
Full textAguilar-Melchor, Carlos, Joris Barrier, Laurent Fousse, and Marc-Olivier Killijian. "XPIR : Private Information Retrieval for Everyone." Proceedings on Privacy Enhancing Technologies 2016, no. 2 (2016): 155–74. http://dx.doi.org/10.1515/popets-2016-0010.
Full textVaidya, Kanishak, and Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches." Entropy 25, no. 8 (2023): 1228. http://dx.doi.org/10.3390/e25081228.
Full textPaskin-Cherniavsky, Anat, and Leora Schmerler. "On Share Conversions for Private Information Retrieval." Entropy 21, no. 9 (2019): 826. http://dx.doi.org/10.3390/e21090826.
Full textKrishnan K. H., Murali, and Jagadeesh Harshan. "On the Existence of XOR-Based Codes for Private Information Retrieval with Private Side Information." Entropy 23, no. 10 (2021): 1287. http://dx.doi.org/10.3390/e23101287.
Full textLuo, Ming, and Mingsheng Wang. "Faster Spiral: Low-Communication, High-Rate Private Information Retrieval." Cryptography 9, no. 1 (2025): 13. https://doi.org/10.3390/cryptography9010013.
Full textVithana, Sajani, and Sennur Ulukus. "Deceptive Information Retrieval." Entropy 26, no. 3 (2024): 244. http://dx.doi.org/10.3390/e26030244.
Full textAhmad, Ishtiyaque, Divyakant Agrawal, Amr El Abbadi, and Trinabh Gupta. "Private Information Retrieval in Large Scale Public Data Repositories." Proceedings of the VLDB Endowment 16, no. 12 (2023): 3868–71. http://dx.doi.org/10.14778/3611540.3611572.
Full textWei, Yi-Peng, Batuhan Arasli, Karim Banawan, and Sennur Ulukus. "The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases." Information 10, no. 12 (2019): 372. http://dx.doi.org/10.3390/info10120372.
Full textXu, Wenju, Baocang Wang, Rongxing Lu, Quanbo Qu, Yange Chen, and Yupu Hu. "Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials." Security and Communication Networks 2021 (April 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/5553256.
Full textTian, Chao, Hua Sun, and Jun Chen. "A Shannon-Theoretic Approach to the Storage–Retrieval Trade-Off in PIR Systems." Information 14, no. 1 (2023): 44. http://dx.doi.org/10.3390/info14010044.
Full textKon, Wen Yu, and Charles Ci Wen Lim. "Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography." Entropy 23, no. 1 (2020): 54. http://dx.doi.org/10.3390/e23010054.
Full textRiad, Khaled, and Lishan Ke. "Secure Storage and Retrieval of IoT Data Based on Private Information Retrieval." Wireless Communications and Mobile Computing 2018 (November 18, 2018): 1–8. http://dx.doi.org/10.1155/2018/5452463.
Full textDavidson, Alex, Gonçalo Pestana, and Sofía Celi. "FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (2023): 365–83. http://dx.doi.org/10.56553/popets-2023-0022.
Full textBeimel, Amos, Yuval Ishai, and Tal Malkin. "Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing." Journal of Cryptology 17, no. 2 (2004): 125–51. http://dx.doi.org/10.1007/s00145-004-0134-y.
Full textKhan, Rafiullah, Mohib Ullah, Atif Khan, Muhammad Irfan Uddin, and Maha Al-Yahya. "NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols." Complexity 2021 (February 2, 2021): 1–8. http://dx.doi.org/10.1155/2021/6651662.
Full textDai, Zhiguo, and Jichao Li. "A location-based service scheme with attribute information privacy." PLOS ONE 19, no. 9 (2024): e0309919. http://dx.doi.org/10.1371/journal.pone.0309919.
Full textDemmler, Daniel, Peter Rindal, Mike Rosulek, and Ni Trieu. "PIR-PSI: Scaling Private Contact Discovery." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 159–78. http://dx.doi.org/10.1515/popets-2018-0037.
Full textMd. Latiful Hoque, Dr Abu Sayed, and Gahangir Hossain. "PIR with P-Cache: A New Private Information Retrieval Protocol With Improved Performance." Malaysian Journal of Computer Science 21, no. 1 (2008): 33–44. http://dx.doi.org/10.22452/mjcs.vol21no1.4.
Full textVadapalli, Adithya, Fattaneh Bayatbabolghani, and Ryan Henry. "You May Also Like... Privacy: Recommendation Systems Meet PIR." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 30–53. http://dx.doi.org/10.2478/popets-2021-0059.
Full textWang, Xun, Tao Luo, and Jianfeng Li. "An Efficient Fully Homomorphic Encryption Scheme for Private Information Retrieval in the Cloud." International Journal of Pattern Recognition and Artificial Intelligence 34, no. 04 (2019): 2055008. http://dx.doi.org/10.1142/s0218001420550083.
Full textKhan, Rafiullah, Muhammad Arshad Islam, Mohib Ullah, Muhammad Aleem, and Muhammad Azhar Iqbal. "Privacy Exposure Measure: A Privacy-Preserving Technique for Health-Related Web Search." Journal of Medical Imaging and Health Informatics 9, no. 6 (2019): 1196–204. http://dx.doi.org/10.1166/jmihi.2019.2709.
Full textBouarara, Hadj Ahmed, Reda Mohamed Hamou, Amine Rahmani, and Abdelmalek Amine. "Application of Meta-Heuristics Methods on PIR Protocols Over Cloud Storage Services." International Journal of Cloud Applications and Computing 4, no. 3 (2014): 1–19. http://dx.doi.org/10.4018/ijcac.2014070101.
Full textSun, Hua, and Chao Tian. "Breaking the MDS-PIR Capacity Barrier via Joint Storage Coding." Information 10, no. 9 (2019): 265. http://dx.doi.org/10.3390/info10090265.
Full textWei, WANG, SHAO Yu, DUAN Jia, and ZHANG Zehua. "Privacy-Preserving Computation:A Comprehensive Survey of Methods and Applications." Chinese Computer Sciences Review 1, no. 1 (2023): 1–12. http://dx.doi.org/10.48014/ccsr.20230517001.
Full textLiang, Ling, Jilan Lin, Zheng Qu, et al. "SPG: Structure-Private Graph Database via SqueezePIR." Proceedings of the VLDB Endowment 16, no. 7 (2023): 1615–28. http://dx.doi.org/10.14778/3587136.3587138.
Full textDemmler, Daniel. "Towards practical privacy-preserving protocols." it - Information Technology 64, no. 1-2 (2022): 49–53. http://dx.doi.org/10.1515/itit-2022-0005.
Full textHenry, Ryan. "Polynomial Batch Codes for Efficient IT-PIR." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (2016): 202–18. http://dx.doi.org/10.1515/popets-2016-0036.
Full textKwecka, Zbigniew, and William J. Buchanan. "Minimising Collateral Damage." International Journal of Information Technologies and Systems Approach 4, no. 2 (2011): 12–31. http://dx.doi.org/10.4018/jitsa.2011070102.
Full textKhan, Rafiullah, Arshad Ahmad, Alhuseen Omar Alsayed, Muhammad Binsawad, Muhammad Arshad Islam, and Mohib Ullah. "QuPiD Attack: Machine Learning-Based Privacy Quantification Mechanism for PIR Protocols in Health-Related Web Search." Scientific Programming 2020 (July 14, 2020): 1–11. http://dx.doi.org/10.1155/2020/8868686.
Full textHafiz, Syed Mahbub, and Ryan Henry. "A Bit More Than a Bit Is More Than a Bit Better." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (2019): 112–31. http://dx.doi.org/10.2478/popets-2019-0061.
Full textCleve, R., D. Gavinsky, and R. Jain. "Entanglement-resistant two-Prover interactive proof systems and non-adaptive PIRs." Quantum Information and Computation 9, no. 7&8 (2009): 648–56. http://dx.doi.org/10.26421/qic9.7-8-7.
Full textLinvill, Kirby, Gowtham Kaki, and Eric Wustrow. "Verifying Indistinguishability of Privacy-Preserving Protocols." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (2023): 1442–69. http://dx.doi.org/10.1145/3622849.
Full textMartishin, Sergey Anatolievich, Marina Valerievna Khrapchenko, and Alexander Vladimirovich Shokurov. "Organization of a secure query to a database in the cloud." Proceedings of the Institute for System Programming of the RAS 34, no. 3 (2022): 173–88. http://dx.doi.org/10.15514/ispras-2022-34(3)-12.
Full textS.Jaya, Nirmala 1. S.Mary Saira Bhanu 1. Ahtesham Akhtar Patel 2. "A COMPARATIVE STUDY OF THE SECRET SHARING ALGORITHMS FOR SECURE DATA IN THE CLOUD." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, August (2018): 01–09. https://doi.org/10.5281/zenodo.1438582.
Full textVarnovskiy, Nikolay Pavlovich, Sergey Anatolievich Martishin, Marina Valerievna Khrapchenko, and Alexander Vladimirovich Shokurov. "About Cloud Request Protection." Proceedings of the Institute for System Programming of the RAS 35, no. 5 (2023): 37–54. http://dx.doi.org/10.15514/ispras-2022-35(5)-3.
Full textPaskin-Cherniavsky, Anat, and Olga Nissenbaum. "New Bounds and a Generalization for Share Conversion for 3-Server PIR." Entropy 24, no. 4 (2022): 497. http://dx.doi.org/10.3390/e24040497.
Full textChang, Sung-Shan, Shi-Jer Lou, Shuenn-Ren Cheng, and Chin-Lang Lin. "Exploration of usage behavioral model construction for university library electronic resources." Electronic Library 33, no. 2 (2015): 292–307. http://dx.doi.org/10.1108/el-10-2013-0195.
Full textKjamilji, Artrim. "Techniques and Challenges while Applying Machine Learning Algorithms in Privacy Preserving Fashion." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): xix. http://dx.doi.org/10.14421/icse.v3.600.
Full textKalai, Yael Tauman, Ran Raz, and Ron D. Rothblum. "How to Delegate Computations: The Power of No-Signaling Proofs." Journal of the ACM 69, no. 1 (2022): 1–82. http://dx.doi.org/10.1145/3456867.
Full textKumar, Sarvesh, Mohammed Abdul Wajeed, Rajashekhar Kunabeva, et al. "Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models." Computational Intelligence and Neuroscience 2022 (March 19, 2022): 1–14. http://dx.doi.org/10.1155/2022/3564436.
Full textMouchet, Christian, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, and Jean-Pierre Hubaux. "Multiparty Homomorphic Encryption from Ring-Learning-with-Errors." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 291–311. http://dx.doi.org/10.2478/popets-2021-0071.
Full textHuang, Xiaobing, Tian Zhao, and Yu Cao. "PIR." International Journal of Multimedia Data Engineering and Management 5, no. 3 (2014): 1–27. http://dx.doi.org/10.4018/ijmdem.2014070101.
Full textHaskell, Andrew, and Todd Kim. "Implementation of Patient-Reported Outcomes Measurement Information System (PROMIS) Data Collection in a Private Orthopedic Surgery Practice." Foot & Ankle Orthopaedics 2, no. 2 (2017): 2473011416S0001. http://dx.doi.org/10.1177/2473011417s000013.
Full textYekhanin, Sergey. "Private information retrieval." Communications of the ACM 53, no. 4 (2010): 68–73. http://dx.doi.org/10.1145/1721654.1721674.
Full textChor, Benny, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. "Private information retrieval." Journal of the ACM 45, no. 6 (1998): 965–81. http://dx.doi.org/10.1145/293347.293350.
Full textYi, Xun, Russell Paulet, and Elisa Bertino. "Private Information Retrieval." Synthesis Lectures on Information Security, Privacy, and Trust 4, no. 2 (2013): 1–114. http://dx.doi.org/10.2200/s00524ed1v01y201307spt005.
Full textKwon, Albert, David Lazar, Srinivas Devadas, and Bryan Ford. "Riffle." Proceedings on Privacy Enhancing Technologies 2016, no. 2 (2016): 115–34. http://dx.doi.org/10.1515/popets-2016-0008.
Full textAbinaya, R., A. Devapriya, and R. Purushothaman. "Cloud based accessibility of Electronic Health Record from android application." International Journal of Trend in Scientific Research and Development 2, no. 3 (2018): 551–54. https://doi.org/10.31142/ijtsrd10980.
Full text