International Journal of Soft Computing

Year: 2017
Volume: 12
Issue: 5
Page No. 294 - 302

Private Information Retrieval in Fuzzy Search Environments

Authors : Eric Bagalwa and Okuthe P. Kogeda

References

Beimel, A. and Y. Ishai, 2001. Information-theoretic private information retrieval: A unified construction. Proceedings of the International Colloquium on Automata, Languages and Programming, July 8-12, 2001, Springer, Berlin, Germany, pp: 912-926.

Beimel, A. and Y. Stahl, 2002. Robust information-theoretic private information retrieval. Proceedings of the 3rd International Conference on SCN, September 11-13, 2002, Springer, Amalfi, Italy, pp: 326-341.

Brin, S., 1995. Near Neighbor Search in Large Metric Spaces. Stanford University, Stanford, California, Pages: 584.

Chakrabarti, S., 2003. Mining the Web: Discovering Knowledge from Hypertext Data. Part 2. Morgan Kaufmann Publishers, California, ISBN: 9781558607545, Pages: 345.

Charikar, M.S., 2002. Similarity estimation techniques from rounding algorithms. Proceedings of the 34th annual ACM Symposium on Theory of Computing, May 19-21, 2002, Montreal, Canada, pp: 380-388.

Chor, B. and N. Gilboa, 1997. Computationally private information retrieval. Proceedings of the 29th Annual ACM Symposium on Theory of Computing, May 04-06, 1997, ACM, New York, USA., ISBN:0-89791-888-6, pp: 304-313.

Chor, B., E. Kushilevitz, O. Goldreich and M. Sudan, 1998. Private information retrieval. J. ACM, 45: 965-981.
CrossRef  |  Direct Link  |  

Ghinita, G., P. Kalnis, A. Khoshgozaran, C. Shahabi and K.L. Tan, 2008. Private queries in location based services: Anonymizers are not necessary. Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, June 09-12, 2008, ACM, New York, USA., ISBN:978-1-60558-102-6, pp: 121-132.

Ishai, Y. and E. Kushilevitz, 1999. Improved upper bounds on information-theoretic private information retrieval. Proceedings of the 31th Annual ACM Symposium on Theory of Computing, May 01-04, 1999, ACM, New York, USA., ISBN:1-58113-067-8, pp: 79-88.

Kushilevitz, E. and R. Ostrovsky, 1997. Replication is not needed: Single database, computationally-private information retrieval. Proceedings of the 38th Annual Symposium on Foundations of Computer Science, October 20-22, 1997, IEEE, Miami Beach, Florida, ISBN:0-8186-8197-7, pp: 364-373.

Marx, G.T., 2003. A tack in the shoe: Neutralizing and resisting the new surveillance. J. Soc. Issues, 59: 369-390.
CrossRef  |  Direct Link  |  

Olumofin, F., P. Tysowski, I. Goldberg and U. Hengartner, 2010. Achieving efficient query privacy for location based services. Proceedings of the 10th International Symposium on Privacy Enhancing Technologies, July 21-23, 2010, Springer, Berlin, Germany, pp: 93-110.

Pang, H., X. Ding and X. Xiao, 2010. Embellishing text search queries to protect user privacy. Proc. VLDB. Endowment, 3: 598-607.
CrossRef  |  Direct Link  |  

Roca, C.J., A. Viejo and J.J. Herrera, 2009. Preserving user’s privacy in web search engines. Comput. Commun., 32: 1541-1551.
Direct Link  |  

Schridde, C. and B. Freisleben, 2008. On the validity of the Φ-Hiding assumption in cryptographic protocols. Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology-ASIACRYPT, December 7-11, 2008, Springer, Melbourne, Australia, pp: 344-354.

Tsan-Sheng, H., J.L. Churn, D.W. Wei and J. Chen, 2002. Quantifying privacy leakage through answering database queries. Proceedings of the 5th International Conference on Information Security, September 30-October-2, 2002, Springer, Sao Paulo, Brazil, pp: 162-176.

Ye, S., F. Wu, R. Pandey and H. Chen, 2009. Noise injection for search privacy protection. Proceedings of the International Conference on Computational Science and Engineering Vol. 3, August 29-31, 2009, IEEE, Vancouver, British Columbia, ISBN:978-1-4244-5334-4, pp: 1-8.

Young, A. and Y. Moti, 2004. Malicious Cryptography: Exposing Cryp- Tovirology. Wiley, Hoboken, New Jersey, ISBN:0-7645-4975-8, Pages: 387.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved