On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers | IEEE Journals & Magazine | IEEE Xplore