Back to Results
First PageMeta Content
Oblivious transfer / ID-based encryption / Universal composability / Communications protocol / Cryptographic protocols / Data / Information


Cryptography for Secure and Private Databases: Enabling Practical Data Access without Compromising Privacy by Matthew Daniel Green
Add to Reading List

Document Date: 2010-02-27 17:25:11


Open Document

File Size: 1,04 MB

Share Result on Facebook

City

Blind Identity / Baltimore / /

Company

America Online / Microsoft / /

Event

FDA Phase / /

Facility

Computer Science University of Virginia Johns Hopkins University / The Johns Hopkins University / Building Blocks / /

IndustryTerm

malicious operator / web search histories / web search / insurance coverage decisions / k×1 protocol / user-initialization protocols / shelat protocol / /

Organization

Associate Professor Department of Computer Science Department / The Johns Hopkins University / National Science Foundation / University of Virginia Johns Hopkins University / Johns Hopkins University / ABSTRACT Susan Hohenberger Gerald Masson Assistant Professor & Advisor Professor Department of Computer Science Department / /

Person

Scott Coull / Susan Hohenberger / Sujata Garera / Giuseppe Ateniese / Gerald Masson / Melissa / Darren Davis / Adam Stubblefield / Reza Curtmola / Brent Waters / Kevin Fu / Sam Small / Avi Rubin / Lucas Ballard / Stephen Bono / Josh Mason / Susan Hohenberger Gerald Masson / Anna Lisa Ferrara / Fabian Monrose / Zachary Peterson / /

Position

advisor / disease specialist / Assistant Professor / /

Product

Franklin / Waters / CNs07 / Boyen-Waters / Boneh-Boyen / Boneh-Boyen IBE / Can01 / /

ProvinceOrState

Maryland / /

Technology

Encryption / k-out-of-N OT protocol / Cryptography / promising technology / A third OT protocol / adaptive and non-adaptive Oblivious Transfer protocols / user-initialization protocols / OTN k×1 protocol / SDH / 4.1 Blind Identity-Based Encryption / BlindExtract protocol / shelat protocol / 27 3.7 Identity-Based Encryption / OT protocols / 59 6.1 6.2 Protocols / /

SocialTag