Date: 2010-11-09 13:29:34Applied mathematics Coding theory Mathematics Private information retrieval Finite fields Computational complexity theory Oblivious transfer Locally decodable code Information retrieval Theoretical computer science Cryptographic protocols Error detection and correction | | contributed articles Cryptographic protocols safeguard the privacy of user queries to public databases.Add to Reading ListSource URL: research.microsoft.comDownload Document from Source Website File Size: 4,44 MBShare Document on Facebook
|