Back to Results
First PageMeta Content
Database theory / Database management systems / Database / Obfuscated code / SQL / Privacy / Computing / Data management / Computer programming


Obfuscated Databases and Group Privacy Arvind Narayanan and Vitaly Shmatikov The University of Texas at Austin {arvindn,shmat}@cs.utexas.edu ABSTRACT
Add to Reading List

Document Date: 2005-09-13 00:39:12


Open Document

File Size: 201,71 KB

Share Result on Facebook

City

Alexandria / /

Company

AES / Visa 4390XXXX Airline / Travel.com. / Computer Sciences / Acme Travel / /

Country

United States / Sudan / /

Currency

USD / /

/

Facility

Vitaly Shmatikov The University of Texas / University of Auckland / /

IndustryTerm

probabilistic polynomial-time adversarial algorithm / accesscontrol software / Partial-match retrieval algorithms / binary search using queries / telephone directory / software protection / Privacy-preserving data mining / obfuscation algorithm / boolean circuit computing / airline passenger database / toy airline passenger database / retrieval algorithm / Web protocols / resistant software / access-control software / secure database obfuscation algorithm / probabilistic polynomial-time simulator algorithm / probabilistic poly-time oracle algorithm / keyword search / customer relationship management / /

Organization

University of Texas at Austin / If P / Internet Society / University of Auckland / IEEE Computer Society / Department of Computer Sciences / /

Person

Beaver / Vitaly Shmatikov / /

Position

extractor / vp / Cob / using Cob / General / /

Product

Franklin / /

ProvinceOrState

Virginia / /

PublishedMedium

Communications of the ACM / IEEE Transactions on Software Engineering / Theory of Computing / /

Technology

Encryption / 4.5 Efficiency The algorithm / cryptography / circuit C. The retrieval algorithm / PPT algorithm / probabilistic poly-time oracle algorithm / CRM / rilE1 Retrieval algorithm / retrieval algorithm / data mining / probabilistic polynomial-time adversarial algorithm / provably secure database obfuscation algorithm / simulation / Partial-match retrieval algorithms / Web protocols / obfuscation algorithm / Public key encryption / probabilistic polynomial-time simulator algorithm / /

SocialTag