-
2
-
-
77957004194
-
-
Cryptology ePrint Archive, Report 2010/108
-
Damg̊ ard, I., Meldgaard, S., Nielsen, J.B.: Perfectly secure oblivious RAM without random oracles. Cryptology ePrint Archive, Report 2010/108 (2010), http://eprint.iacr.org/
-
(2010)
Perfectly Secure Oblivious RAM Without Random Oracles
-
-
Damg̊ard, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
4
-
-
58449099693
-
On distributing symmetric streaming computations
-
Feldman, J., Muthukrishnan, S., Sidiropoulos, A., Stein, C., Svitkina, Z.: On distributing symmetric streaming computations. In: ACM-SIAM Symp. on Discrete Algorithms (SODA), pp. 710-719 (2008)
-
(2008)
ACM-SIAM Symp. on Discrete Algorithms (SODA)
, pp. 710-719
-
-
Feldman, J.1
Muthukrishnan, S.2
Sidiropoulos, A.3
Stein, C.4
Svitkina, Z.5
-
5
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431-473 (1996)
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
6
-
-
84904329628
-
-
unpublished manuscript
-
Goodrich, M., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-preserving group data access via stateless oblivious RAM simulation (unpublished manuscript)
-
Privacy-preserving Group Data Access Via Stateless Oblivious RAM Simulation
-
-
Goodrich, M.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
9
-
-
77951678492
-
A model of computation for MapReduce
-
Karloff, H., Suri, S., Vassilvitskii, S.: A model of computation for MapReduce. In: Proc. ACM-SIAM Sympos. Discrete Algorithms (SODA), pp. 938-948 (2010)
-
(2010)
Proc. ACM-SIAM Sympos. Discrete Algorithms (SODA)
, pp. 938-948
-
-
Karloff, H.1
Suri, S.2
Vassilvitskii, S.3
-
10
-
-
78751547707
-
More robust hashing: Cuckoo hashing with a stash
-
Kirsch, A., Mitzenmacher, M., Wieder, U.: More robust hashing: cuckoo hashing with a stash. SIAM J. Comput. 39, 1543-1561 (2009)
-
(2009)
SIAM J. Comput.
, vol.39
, pp. 1543-1561
-
-
Kirsch, A.1
Mitzenmacher, M.2
Wieder, U.3
-
12
-
-
0000672724
-
Concentration
-
Habib, M., McDiarmid, C., Ramirez-Alfonsin, J., Reed, B. (eds.) Springer, Berlin
-
McDiarmid, C.: Concentration. In: Habib, M., McDiarmid, C., Ramirez-Alfonsin, J., Reed, B. (eds.) Probabilistic Methods for Algorithmic Discrete Mathematics, pp. 195-248. Springer, Berlin (1998)
-
(1998)
Probabilistic Methods for Algorithmic Discrete Mathematics
, pp. 195-248
-
-
McDiarmid, C.1
-
14
-
-
77957007201
-
Oblivious RAM revisited
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Pinkas, B., Reinman, T.: Oblivious RAM revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 502-519. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 502-519
-
-
Pinkas, B.1
Reinman, T.2
-
15
-
-
85180787079
-
Usable pir
-
The Internet Society, San Diego
-
Williams, P., Sion, R.: Usable pir. In: NDSS. The Internet Society, San Diego (2008)
-
(2008)
NDSS
-
-
Williams, P.1
Sion, R.2
-
16
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: 15th ACM Conf. on Computer and Communications Security (CCS), pp. 139-148 (2008)
-
(2008)
15th ACM Conf. on Computer and Communications Security (CCS)
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
|