7   Artículos

 
en línea
Xingchen Wang and Peng Li    
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hua Sun and Chao Tian    
The capacity of private information retrieval (PIR) from databases coded using maximum distance separable (MDS) codes was previously characterized by Banawan and Ulukus, where it was assumed that the messages are encoded and stored separably in the datab... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yi-Peng Wei, Batuhan Arasli, Karim Banawan and Sennur Ulukus    
We consider the private information retrieval (PIR) problem from decentralized uncoded caching databases. There are two phases in our problem setting, a caching phase, and a retrieval phase. In the caching phase, a data center containing all the K files,... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jinsheng Zhang, Qiumao Ma, Wensheng Zhang and Daji Qiao    
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client?s access pattern to outsourced data. TSKT-ORAM organizes each of the server storages as a k-ary tree and adopts XOR-based private information ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »