Back to Results
First PageMeta Content
Applied mathematics / Coding theory / Mathematics / Private information retrieval / Finite fields / Computational complexity theory / Oblivious transfer / Locally decodable code / Information retrieval / Theoretical computer science / Cryptographic protocols / Error detection and correction


contributed articles Cryptographic protocols safeguard the privacy of user queries to public databases.
Add to Reading List

Document Date: 2010-11-09 13:29:34


Open Document

File Size: 4,44 MB

Share Result on Facebook
UPDATE