Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
The Internet and the World Wide Web (WWW) play an increasingly imp- tant role in our today’s activities. More and more we use the Web to buy goods and to inform ourselves about cultural, political, economical, medical, and scienti?c developments. For example, accessing ?ight schedules, me- cal data, or retrieving stock information become common practice in today’s world. Many people assume that there is no one who “watches” them when accessing this data. However,sensitive userswho accesselectronic shops(e-shops) might have observedthat this assumptionoften isnot true. In many cases,E-shopstrack the users’“accessbehavior”when browsingthe Web pagesof the e-shopthus deriving “accesspatterns” for individual shoppers. Therefore,this knowledge on access behavior and access patters allows the system to tailor access to Webpagesforthatusertohis/herspeci?cneedsinthefuture.Thistrackingof usersmightbeconsideredharmlessand“acceptable”inmanycases.However, in cases when this information is used to harm a person - for example about the person’s health problems - or to violate his/her privacy (for example ?nding out about his/her ?nancial situation), he/she would like to be sure that such tracking is impossible to protect the user’s rights.
Content Level »Research
Keywords »Information Retrieval - Internet - Web queries - algorithms - anonymity - complexity - database queries - digital rights management - distributed information systems - e-commerce - e-voting systems - information protection - privacy - private information retrieval - query protocols
and Related Work.- 1 Introduction.- 2 Related Work.- Almost Optimal PIR.- 3 PIR with O(1) Query Response Time and O(1) Communication.- 4 Improving Processing and Preprocessing Complexity.- 5 Experimental Analysis of Shuffling Algorithms.- Generalizing the PIR Model.- 6 Repudiative Information Retrieval.- 7 Digital Rights Management for PIR.- Discussion.- 8 Conclusion and Future Work.- References.