نتایج جستجو برای: pir
تعداد نتایج: 1350 فیلتر نتایج به سال:
In this paper we generalize the concept of Private Information Retrieval (PIR) by formalizing a new cryptographic primitive, named Extended Private Information Retrieval (EPIR). Instead of enabling a user to retrieve a bit (or a block) from a database as in the case of PIR, an EPIR protocol enables a user to evaluate a function f which takes a string chosen by the user and a block from the data...
A PIR scheme is a scheme that allows an user to get an element of a database without giving any information about what part of the database he is interested in. In this paper we present a lattice-based PIR scheme, using an NTRU-like approach, in which the computational cost is a few thousand bit-operations per bit in the database. This improves the protocol computational performance by two orde...
The Protein Identification Resource, which provides the scientific community with an efficient on-line computer system designed for the identification and analysis of protein sequences and their corresponding coding sequences, has been established. The resource consists of an integrated computer system composed of a number of protein and nucleic acid sequence databases and the software necessar...
This paper presents some analytic results concerning the pivot interval routing (PIR) strategy of [T. Eilam, C. Gavoille, D. Peleg, Compact routing schemes with low stretch factor, J.Algorithms 46(2) (2003) 97–114, Preliminary version appeared. in: Proceedings of the 17thACM Symposium on Principles of Distributed Computing, June 1998, pp. 11–20.] That strategy allows message routing on every we...
BACKGROUND & AIMS Innate and adaptive immune responses are regulated by cross talk between activation and inhibitory signals. Dysregulation of the inhibitory signal can lead to aberrant chronic inflammatory diseases such as the inflammatory bowel diseases (IBD). Little is known about negative regulation of innate intestinal immune activation. We examined the role of the inhibitory receptor pair...
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users: (i) hiding locations inside cloaking regions (CRs) a...
INTRODUCTION Lipodystrophy is still a matter of concern in HIV+ patients receiving ART. However, long-term fat change in patients taking non-thymidine regimens is not well known. MATERIALS AND METHODS A prospective ongoing fat change assessment including clinical evaluation and dexa scans (Hologic QDR 4500) is being conducted in all consecutive patients initiating ART from January 2008. Arm, ...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be practical, a single server PIR protocol has to be both communicationally and computationally efficient. In this paper, we present a single server PIR protocol that has low communication cost and is much faster than existing protocols. A major building block of the PIR protocol in this paper is a t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید