-
3
-
-
84889068370
-
-
Trusted computing group. http://www.trustedcomputinggroup.org/.
-
-
-
-
4
-
-
84889024303
-
-
Windows azure. http://www.windowsazure.com/.
-
-
-
-
5
-
-
33746784225
-
Almost optimal private information retrieval
-
D. Asonov and J.-C. Freytag. Almost optimal private information retrieval. In PET, 2003.
-
(2003)
PET
-
-
Asonov, D.1
Freytag, J.-C.2
-
6
-
-
84874786070
-
Obliviad: Provably secure and practical online behavioral advertising
-
M. Backes, A. Kate, M. Maffe, and K. Pecina. Obliviad: Provably secure and practical online behavioral advertising. In S & P, 2012.
-
(2012)
S & P
-
-
Backes, M.1
Kate, A.2
Maffe, M.3
Pecina, K.4
-
8
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In CCSW, 2009.
-
(2009)
CCSW
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
9
-
-
82955204091
-
Perfectly secure oblivious RAM without random oracles
-
I. Damgård, S. Meldgaard, and J. B. Nielsen. Perfectly secure oblivious RAM without random oracles. In TCC, 2011.
-
(2011)
TCC
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
10
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In STOC, 1987.
-
(1987)
STOC
-
-
Goldreich, O.1
-
11
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 1996.
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
12
-
-
84855243919
-
Randomized shellsort: A simple data-oblivious sorting algorithm
-
Dec.
-
M. T. Goodrich. Randomized shellsort: A simple data-oblivious sorting algorithm. J. ACM, 58(6):27:1-27:26, Dec. 2011.
-
(2011)
J. ACM
, vol.58
, Issue.6
-
-
Goodrich, M.T.1
-
13
-
-
84881228714
-
Privacy-preserving access of outsourced data via oblivious RAM simulation
-
M. T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via oblivious RAM simulation. In ICALP, 2011.
-
(2011)
ICALP
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
16
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In SODA, 2012.
-
(2012)
SODA
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
17
-
-
17444392883
-
Protecting client privacy with trusted computing at the server
-
Mar.
-
A. Iliev and S. W. Smith. Protecting client privacy with trusted computing at the server. IEEE Security and Privacy, 3(2):20-28, Mar. 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 20-28
-
-
Iliev, A.1
Smith, S.W.2
-
19
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012.
-
(2012)
SODA
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
20
-
-
84881262607
-
Shroud: Enabling private access to large-scale data in the data center
-
J. R. Lorch, J. W. Mickens, B. Parno, M. Raykova, and J. Schiffman. Shroud: Enabling private access to large-scale data in the data center. In FAST, 2013.
-
(2013)
FAST
-
-
Lorch, J.R.1
Mickens, J.W.2
Parno, B.3
Raykova, M.4
Schiffman, J.5
-
21
-
-
84875106434
-
Distributed oblivious ram for secure two-party computation
-
Report 2011/384
-
S. Lu and R. Ostrovsky. Distributed oblivious ram for secure two-party computation. Cryptology ePrint Archive, Report 2011/384, 2011. http://eprint.iacr.org/.
-
(2011)
Cryptology ePrint Archive
-
-
Lu, S.1
Ostrovsky, R.2
-
23
-
-
0030714231
-
Private information storage (extended abstract)
-
R. Ostrovsky and V. Shoup. Private information storage (extended abstract). In STOC, pages 294-303, 1997.
-
(1997)
STOC
, pp. 294-303
-
-
Ostrovsky, R.1
Shoup, V.2
-
24
-
-
77954780208
-
The case for ramclouds: Scalable high-performance storage entirely in dram
-
Jan.
-
J. Ousterhout, P. Agrawal, D. Erickson, C. Kozyrakis, J. Leverich, D. Mazières, S. Mitra, A. Narayanan, G. Parulkar, M. Rosenblum, S. M. Rumble, E. Stratmann, and R. Stutsman. The case for ramclouds: scalable high-performance storage entirely in dram. SIGOPS Oper. Syst. Rev., 43(4):92-105, Jan. 2010.
-
(2010)
SIGOPS Oper. Syst. Rev.
, vol.43
, Issue.4
, pp. 92-105
-
-
Ousterhout, J.1
Agrawal, P.2
Erickson, D.3
Kozyrakis, C.4
Leverich, J.5
Mazières, D.6
Mitra, S.7
Narayanan, A.8
Parulkar, G.9
Rosenblum, M.10
Rumble, S.M.11
Stratmann, E.12
Stutsman, R.13
-
26
-
-
78650083239
-
Seeding clouds with trust anchors
-
J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. McDaniel. Seeding clouds with trust anchors. In CCSW, pages 43-46, 2010.
-
(2010)
CCSW
, pp. 43-46
-
-
Schiffman, J.1
Moyer, T.2
Vijayakumar, H.3
Jaeger, T.4
McDaniel, P.5
-
27
-
-
82955173838
-
Oblivious RAM with O ((log N) 3) worst-case cost
-
E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li. Oblivious RAM with O ((log N) 3) worst-case cost. In ASIACRYPT, pages 197-214, 2011.
-
(2011)
ASIACRYPT
, pp. 197-214
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
28
-
-
0034809926
-
Practical server privacy with secure coprocessors
-
Mar.
-
S. W. Smith and D. Safford. Practical server privacy with secure coprocessors. IBM Syst. J., 40(3):683-695, Mar. 2001.
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 683-695
-
-
Smith, S.W.1
Safford, D.2
-
31
-
-
85180805635
-
Towards practical oblivious RAM
-
E. Stefanov, E. Shi, and D. Song. Towards practical oblivious RAM. In NDSS, 2012.
-
(2012)
NDSS
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
33
-
-
84881256639
-
Round-optimal access privacy on outsourced storage
-
P. Williams and R. Sion. Round-optimal access privacy on outsourced storage. In CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
-
34
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In CCS, 2008.
-
(2008)
CCS
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
35
-
-
84869453208
-
Privatefs: A parallel oblivious file system
-
P. Williams, R. Sion, and A. Tomescu. Privatefs: A parallel oblivious file system. In CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
Tomescu, A.3
|