메뉴 건너뛰기




Volumn , Issue , 2012, Pages 293-304

Single round access privacy on outsourced storage

Author keywords

Access privacy; Cloud computing; Oblivious RAM

Indexed keywords

COMMUNICATION COST; COMPUTATION COSTS; INTERNET-SCALE NETWORKS; LARGE DATASETS; MALICIOUS ADVERSARIES; OFFLINE; ON-LINE COMMUNICATION; QUERY OBJECT; ROUND TRIP;

EID: 84869381921     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382229     Document Type: Conference Paper
Times cited : (70)

References (19)
  • 3
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 5
    • 79953223285 scopus 로고    scopus 로고
    • Perfectly secure Oblivious RAM without random oracles
    • volume 6597 of Lecture Notes in Computer Science
    • Ivan Damgård, Sigurd Meldgaard, and Jesper Nielsen. Perfectly secure Oblivious RAM without random oracles. In Theory of Cryptography, volume 6597 of Lecture Notes in Computer Science, pages 144-163. 2011.
    • (2011) Theory of Cryptography , pp. 144-163
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.3
  • 6
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on Oblivious RAMs
    • May
    • Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on Oblivious RAMs. Journal of the ACM, 45:431-473, May 1996.
    • (1996) Journal of the ACM , vol.45 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 14
    • 77957007201 scopus 로고    scopus 로고
    • Oblivious RAM revisited
    • Benny Pinkas and Tzachy Reinman. Oblivious RAM revisited. In CRYPTO, pages 502-519, 2010.
    • (2010) CRYPTO , pp. 502-519
    • Pinkas, B.1    Reinman, T.2
  • 15
    • 0034809926 scopus 로고    scopus 로고
    • Practical server privacy with secure coprocessors
    • Sean W. Smith and David Safford. Practical server privacy with secure coprocessors. IBM Systems Journal, 40(3):683-695, 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 683-695
    • Smith, S.W.1    Safford, D.2
  • 19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.