-
3
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
5
-
-
79953223285
-
Perfectly secure Oblivious RAM without random oracles
-
volume 6597 of Lecture Notes in Computer Science
-
Ivan Damgård, Sigurd Meldgaard, and Jesper Nielsen. Perfectly secure Oblivious RAM without random oracles. In Theory of Cryptography, volume 6597 of Lecture Notes in Computer Science, pages 144-163. 2011.
-
(2011)
Theory of Cryptography
, pp. 144-163
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.3
-
6
-
-
0030149547
-
Software protection and simulation on Oblivious RAMs
-
May
-
Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on Oblivious RAMs. Journal of the ACM, 45:431-473, May 1996.
-
(1996)
Journal of the ACM
, vol.45
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
10
-
-
84869401018
-
Practical oblivious storage
-
New York, NY, USA. ACM
-
Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, and Roberto Tamassia. Practical oblivious storage. In Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASPY '12, pages 13-24, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY '12
, pp. 13-24
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
13
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
SIAM
-
Eyal Kushilevitz, Steve Lu, and Rafail Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '12, pages 143-156. SIAM, 2012.
-
(2012)
Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '12
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
14
-
-
77957007201
-
Oblivious RAM revisited
-
Benny Pinkas and Tzachy Reinman. Oblivious RAM revisited. In CRYPTO, pages 502-519, 2010.
-
(2010)
CRYPTO
, pp. 502-519
-
-
Pinkas, B.1
Reinman, T.2
-
15
-
-
0034809926
-
Practical server privacy with secure coprocessors
-
Sean W. Smith and David Safford. Practical server privacy with secure coprocessors. IBM Systems Journal, 40(3):683-695, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 683-695
-
-
Smith, S.W.1
Safford, D.2
-
17
-
-
33750268079
-
Private information retrieval using trusted hardware
-
Shuhong Wang, Xuhua Ding, Robert H. Deng, and Feng Bao. Private information retrieval using trusted hardware. In Proceedings of the European Symposium on Research in Computer Security ESORICS, pages 49-64, 2006.
-
(2006)
Proceedings of the European Symposium on Research in Computer Security ESORICS
, pp. 49-64
-
-
Wang, S.1
Ding, X.2
Deng, R.H.3
Bao, F.4
|