Results 31 to 40 of about 251,490 (326)

Information system for managing the register of serialized items based on a cloud service for enterprise economic development [PDF]

open access: yesE3S Web of Conferences, 2023
This article describes the development of an information system for managing the register of serialized items based on a cloud service. Cloud services provide the ability to access computer equipment, hardware resources, disk memory and databases via the
Bondarev Oleg   +4 more
doaj   +1 more source

Blind Interference Alignment for Private Information Retrieval [PDF]

open access: yes, 2016
Blind interference alignment (BIA) refers to interference alignment schemes that are designed only based on channel coherence pattern knowledge at the transmitters (the "blind" transmitters do not know the exact channel values).
Jafar, Syed A., Sun, Hua
core   +2 more sources

Two-Level Private Information Retrieval [PDF]

open access: yes2021 IEEE International Symposium on Information Theory (ISIT), 2021
In the conventional robust $T$-colluding private information retrieval (PIR) system, the user needs to retrieve one of the possible messages while keeping the identity of the requested message private from any $T$ colluding servers. Motivated by the possible heterogeneous privacy requirements for different messages, we consider the $(N, T_1:K_1, T_2 ...
Ruida Zhou   +3 more
openaire   +2 more sources

Asymmetric Leaky Private Information Retrieval [PDF]

open access: yesIEEE Transactions on Information Theory, 2021
Information-theoretic formulations of the private information retrieval (PIR) problem have been investigated under a variety of scenarios. Symmetric private information retrieval (SPIR) is a variant where a user is able to privately retrieve one out of $K$ messages from $N$ non-colluding replicated databases without learning anything about the ...
Islam Samy   +3 more
openaire   +2 more sources

Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols

open access: yesJournal of Mathematical Cryptology, 2007
In this paper, we investigate query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval (PIR) schemes.
Stinson D. R., Wei R.
doaj   +1 more source

Private Stateful Information Retrieval [PDF]

open access: yesProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Private information retrieval (PIR) is a fundamental tool for preserving query privacy when accessing outsourced data. All previous PIR constructions have significant costs preventing widespread use. In this work, we present private stateful information retrieval (PSIR), an extension of PIR, allowing clients to be stateful and maintain information ...
Sarvar Patel   +2 more
openaire   +1 more source

On the Bringer–Chabanne EPIR protocol for polynomial evaluation

open access: yesJournal of Mathematical Cryptology, 2012
Extended private information retrieval (EPIR) was defined by Bringer, Chabanne, Pointcheval and Tang at CANS 2007 and generalized by Bringer and Chabanne at AFRICACRYPT 2009.
Chee Yeow Meng   +2 more
doaj   +1 more source

Polycystic Ovary Syndrome Detection Machine Learning Model Based on Optimized Feature Selection and Explainable Artificial Intelligence

open access: yesDiagnostics, 2023
Polycystic ovary syndrome (PCOS) has been classified as a severe health problem common among women globally. Early detection and treatment of PCOS reduce the possibility of long-term complications, such as increasing the chances of developing type 2 ...
Hela Elmannai   +6 more
doaj   +1 more source

A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers [PDF]

open access: yes, 2014
Since the concept of locally decodable codes was introduced by Katz and Trevisan in 2000, it is well-known that information the-oretically secure private information retrieval schemes can be built using locally decodable codes.
A. Beimel   +6 more
core   +4 more sources

Outsourced private information retrieval [PDF]

open access: yesProceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, 2013
We propose a scheme for outsourcing Private Information Retrieval (PIR) to untrusted servers while protecting the privacy of the database owner as well as that of the database clients. We observe that by layering PIR on top of an Oblivious RAM (ORAM) data layout, we provide the ability for the database owner to perform private writes, while database ...
Yizhou Huang, Ian Goldberg
openaire   +1 more source

Home - About - Disclaimer - Privacy