UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 146
21.
  • Can linear minimum storage regenerating codes be universally secure?
    Goparaju, Sreechakra; El Rouayheb, Salim; Calderbank, Robert 2015 49th Asilomar Conference on Signals, Systems and Computers, 11/2015
    Conference Proceeding, Journal Article

    We study the problem of making a distributed storage system information-theoretically secure against a passive eavesdropper, and aim to characterize coding schemes that are universally secure for up ...
Full text
22.
  • An Equivalence Between Netw... An Equivalence Between Network Coding and Index Coding
    Effros, Michelle; El Rouayheb, Salim; Langberg, Michael IEEE transactions on information theory 61, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    We show that the network coding and index coding problems are equivalent. This equivalence holds in the general setting which includes linear and nonlinear codes. Specifically, we present a reduction ...
Full text

PDF
23.
  • One-Shot PIR: Refinement an... One-Shot PIR: Refinement and Lifting
    D'Oliveira, Rafael G. L.; El Rouayheb, Salim IEEE transactions on information theory, 2020-April, 2020-4-00, Volume: 66, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    We study a class of private information retrieval (PIR) methods that we call one-shot schemes. The intuition behind one-shot schemes is the following. The user's query is regarded as a dot product of ...
Full text

PDF
24.
  • On the Index Coding Problem... On the Index Coding Problem and Its Relation to Network Coding and Matroid Theory
    El Rouayheb, Salim; Sprintson, Alex; Georghiades, Costas IEEE transactions on information theory, 2010-July, 2010-7-00, 20100701, Volume: 56, Issue: 7
    Journal Article
    Peer reviewed

    The index coding problem has recently attracted a significant attention from the research community due to its theoretical significance and applications in wireless ad hoc networks. An instance of ...
Full text

PDF
25.
  • On the Capacity of Single-Server Multi-Message Private Information Retrieval with Side Information
    Heidarzadeh, Anoosheh; Garcia, Brenden; Kadhe, Swanand ... 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2018-Oct.
    Conference Proceeding
    Open access

    We study Private Information Retrieval with Side Information (PIR-SI) in the single-server multi-message setting. In this setting, a user wants to download D messages from a database of K \geq D ...
Full text

PDF
26.
  • Codes for Correcting Locali... Codes for Correcting Localized Deletions
    Kas Hanna, Serge; El Rouayheb, Salim IEEE transactions on information theory, 2021-April, 2021-4-00, Volume: 67, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    We consider the problem of constructing binary codes for correcting deletions that are localized within certain parts of the codeword that are unknown a priori. The model that we study is when ...
Full text
27.
  • Staircase-PIR: Universally Robust Private Information Retrieval
    Bitar, Rawad; Rouayheb, Salim El 2018 IEEE Information Theory Workshop (ITW), 2018-Nov.
    Conference Proceeding
    Open access

    We consider the problem of designing private information retrieval (PIR) schemes on data of m files replicated on n servers that can possibly collude. We focus on devising robust PIR schemes that can ...
Full text

PDF
28.
  • Codes With Locality in the ... Codes With Locality in the Rank and Subspace Metrics
    Kadhe, Swanand; El Rouayheb, Salim; Duursma, Iwan ... IEEE transactions on information theory, 2019-Sept., 2019-9-00, Volume: 65, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    We extend the notion of locality from the Hamming metric to the rank and subspace metrics. Our main contribution is to construct a class of array codes with locality constraints in the rank metric. ...
Full text

PDF
29.
  • Private information retrieval with side information: The single server case
    Kadhe, Swanand; Garcia, Brenden; Heidarzadeh, Anoosheh ... 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2017-Oct.
    Conference Proceeding

    We study the problem of Private Information Retrieval (PIR) in the presence of prior side information. The problem setup includes a database of K independent messages possibly replicated on several ...
Full text
30.
  • Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy
    Ye, Fangwei; Cho, Hyunghoon; Rouayheb, Salim El 2020 IEEE International Symposium on Information Theory (ISIT), 2020-June
    Conference Proceeding
    Open access

    The growing availability of personal genomics services comes with increasing concerns for genomic privacy. Individuals may wish to withhold sensitive genotypes that contain critical health-related ...
Full text

PDF
1 2 3 4 5
hits: 146

Load filters