Towards 5G: Applications, Requirements and Candidate Technologies, 2017. ,
DOI : 10.1002/9781118979846
5G beyond radio access, Mondo Digitale, issue.2, 2018. ,
From network sharing to multi-tenancy: The 5G network slice broker, IEEE Communications Magazine, vol.54, issue.7, pp.32-39 ,
DOI : 10.1109/MCOM.2016.7514161
URL : http://arxiv.org/pdf/1605.01201
EyeQ: Practical network performance isolation for the multi-tenant cloud, HotCloud, 2012. ,
Private information retrieval, Proc. 36th Annual IEEE Symp, pp.41-50, 1995. ,
On the efficiency of local decoding procedures for error-correcting codes, Proceedings of the thirty-second annual ACM symposium on Theory of computing , STOC '00, pp.80-86, 2000. ,
DOI : 10.1145/335305.335315
URL : http://www.cs.columbia.edu/~homin/dixon/kattre00.ps
Private information retrieval, Communications of the ACM, vol.53, issue.4, pp.68-73, 2010. ,
DOI : 10.1145/1721654.1721674
A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948. ,
DOI : 10.1002/j.1538-7305.1948.tb01338.x
, Communication theory of secrecy systems, Bell Labs Technical Journal, vol.28, issue.4, pp.656-715, 1949.
Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security, IEEE Signal Processing Magazine, vol.30, issue.5, pp.41-50, 2013. ,
DOI : 10.1109/MSP.2013.2265141
Locally Decodable Codes, Foundations and Trends?? in Theoretical Computer Science, vol.6, issue.3, pp.139-255, 2012. ,
DOI : 10.1561/0400000030
High-rate codes with sublineartime decoding, Journal of the ACM (JACM), vol.61, issue.5, pp.28-2014 ,
, Theory of Computing, vol.11, issue.1, pp.149-182, 2015.
DOI : 10.4086/toc.2015.v011a005
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers, Int. Conf. on Crypt. and Network Security, pp.222-239, 2014. ,
DOI : 10.1007/978-3-319-12280-9_15
URL : https://hal.archives-ouvertes.fr/hal-01094807
Private Information Retrieval from Coded Databases with Colluding Servers, SIAM Journal on Applied Algebra and Geometry, vol.1, issue.1, pp.647-664, 2017. ,
DOI : 10.1137/16M1102562
The Capacity of Private Information Retrieval From Coded Databases, IEEE Transactions on Information Theory, vol.64, issue.3, pp.1945-1956, 2018. ,
DOI : 10.1109/TIT.2018.2791994
Codes for distributed PIR with low storage overhead, 2015 IEEE International Symposium on Information Theory (ISIT), pp.2852-2856, 2015. ,
DOI : 10.1109/ISIT.2015.7282977
Private information retrieval in distributed storage systems using an arbitrary linear code, 2017 IEEE International Symposium on Information Theory (ISIT), pp.2017-1421 ,
DOI : 10.1109/ISIT.2017.8006763
PIR array codes with optimal PIR rates, 2017 IEEE International Symposium on Information Theory (ISIT), pp.2658-2662, 2017. ,
DOI : 10.1109/ISIT.2017.8007011
Locality in coding theory Available: https, IEEE Information Theory Society, Microsoft Research, 2015. ,
Information sets of Multiplicity codes, 2015 IEEE International Symposium on Information Theory (ISIT), pp.2401-2405, 2015. ,
DOI : 10.1109/ISIT.2015.7282886
URL : https://hal.archives-ouvertes.fr/hal-01188935
Fast systematic encoding of multiplicity codes, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01512372
Projective reed-muller codes, International Colloquium on Coding Theory and Applications, pp.125-129, 1986. ,
DOI : 10.1007/3-540-19368-5_13
On locality of Generalized Reed-Muller codes over the broadcast erasure channel, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), pp.1-4, 2016. ,
DOI : 10.1109/BMSB.2016.7521914
The implicit function theorem: history, theory, and applications, 2012. ,
Inequalities for the gamma function, Archiv der Mathematik, vol.91, issue.6, pp.554-563, 2008. ,
DOI : 10.1007/s00013-008-2856-9
Bounds for the Ratio of Two Gamma Functions, Journal of Inequalities and Applications, vol.11, issue.3, Art. 1, 2010. ,
DOI : 10.1016/j.aam.2009.03.003