{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T17:53:14Z","timestamp":1775584394273,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2002.1045104","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T23:45:08Z","timestamp":1056584708000},"page":"805-810","source":"Crossref","is-referenced-by-count":15,"title":["Private information retrieval in the presence of malicious failures"],"prefix":"10.1109","author":[{"given":"E.Y.","family":"Yang","sequence":"first","affiliation":[]},{"family":"Jie Xu","sequence":"additional","affiliation":[]},{"given":"K.H.","family":"Bennett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Protection of software-based survivability mechanisms","author":"wang","year":"0","journal-title":"Proc of the 2001 Dependable Systems and Networks (DSN'01)-Goteborg Sweden July 2001"},{"key":"16","article-title":"COCA: A secure distributed on-line certification authority","author":"zhou","year":"2000"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"14","first-page":"133","article-title":"How to share a secret with cheaters","volume":"1","author":"tompa","year":"1988","journal-title":"Cryptography"},{"key":"11","article-title":"Secure agreement protocols: Reliable and atomic group multicast in rampart","author":"reiter","year":"0","journal-title":"Proc 2nd ACM CCS 1994"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511525926"},{"key":"3","article-title":"Information-theoretic private information retrieval: A unified construction","author":"beimel","year":"2001","journal-title":"TR0I-15 Electronic Colloquium on Computational Complexity"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-52282-4_30","article-title":"Hiding instances in multioracle queries","author":"beaver","year":"1990","journal-title":"STACS"},{"key":"1","article-title":"Upper bound on the communication complexity of private information retrieval","author":"ambainis","year":"0","journal-title":"Proc of ICALP '97 1997"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646125"},{"key":"7","article-title":"Private information retrieval by keywords","author":"chor","year":"1997"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"4","article-title":"Computationally private information retrieval with ploylogarithmic communication","author":"cachin","year":"0","journal-title":"EUROCRYPT '99 1999"},{"key":"9","article-title":"Lecture notes on cryptography","author":"goldwasser","year":"1996"},{"key":"8","article-title":"A random server model for private information retrieval (or how to achieve information theoretic PIR avoiding data replication)","author":"gertner","year":"0","journal-title":"Proc of 2nd RANDOM 1998"}],"event":{"name":"26th Annual International Computer Software and Applications","location":"Oxford, UK","acronym":"CMPSAC-02"},"container-title":["Proceedings 26th Annual International Computer Software and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8094\/22390\/01045104.pdf?arnumber=1045104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:43:22Z","timestamp":1497566602000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1045104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2002.1045104","relation":{},"subject":[]}}