-
2
-
-
84969253460
-
The random graph threshold for k-orientiability and a fast algorithm for optimal multiple-choice allocation
-
Society for Industrial and Applied Mathematics
-
J. A. Cain, P. Sanders, and N. Wormald. The random graph threshold for k-orientiability and a fast algorithm for optimal multiple-choice allocation. In Proc. SODA, pages 469-476. Society for Industrial and Applied Mathematics, 2007.
-
(2007)
Proc. SODA
, pp. 469-476
-
-
Cain, J.A.1
Sanders, P.2
Wormald, N.3
-
4
-
-
84995516377
-
Compromising privacy in precise query protocols
-
J. Dautrich and C. Ravishankar. Compromising privacy in precise query protocols. In Proc. EDBT, 2013.
-
(2013)
Proc. EDBT
-
-
Dautrich, J.1
Ravishankar, C.2
-
5
-
-
84928107803
-
Combining oram with pir to minimize bandwidth costs
-
J. Dautrich and C. Ravishankar. Combining oram with pir to minimize bandwidth costs. In CODASPY, 2015.
-
(2015)
CODASPY
-
-
Dautrich, J.1
Ravishankar, C.2
-
6
-
-
84937774864
-
Burst ORAM: Minimizing ORAM response times for bursty access patterns
-
J. Dautrich, E. Stefanov, and E. Shi. Burst ORAM: Minimizing ORAM response times for bursty access patterns. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Dautrich, J.1
Stefanov, E.2
Shi, E.3
-
7
-
-
80051865953
-
Efficient and private access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati. Efficient and private access to outsourced data. In Proc. ICDCS, 2011.
-
(2011)
Proc. ICDCS
-
-
De Capitani, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
8
-
-
84907816512
-
Optimizing ORAM and using it efficiently for secure computation
-
C. Gentry, K. Goldman, S. Halevi, C. Julta, M. Raykova, and D. Wichs. Optimizing ORAM and using it efficiently for secure computation. In PETS, 2013.
-
(2013)
PETS
-
-
Gentry, C.1
Goldman, K.2
Halevi, S.3
Julta, C.4
Raykova, M.5
Wichs, D.6
-
9
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM), 43(3):431-473, 1996.
-
(1996)
Journal of the ACM (JACM)
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
10
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
SIAM
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious RAM simulation. In Proc. SODA, pages 157-167. SIAM, 2012.
-
(2012)
Proc. SODA
, pp. 157-167
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
11
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
M. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS, 2012.
-
(2012)
NDSS
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
13
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
SIAM
-
E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Proc. SODA, pages 143-156. SIAM, 2012.
-
(2012)
Proc. SODA
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
14
-
-
84890416103
-
Shroud: Ensuring private access to large-scale data in the data center
-
J. R. Lorch, B. Parno, J. W. Mickens, M. Raykova, and J. Schiffman. Shroud: Ensuring private access to large-scale data in the data center. FAST, pages 199-213, 2013.
-
(2013)
FAST
, pp. 199-213
-
-
Lorch, J.R.1
Parno, B.2
Mickens, J.W.3
Raykova, M.4
Schiffman, J.5
-
15
-
-
84889002819
-
PHANTOM: Practical oblivious computation in a secure processor
-
M. Maas, E. Love, E. Stefanov, M. Tiwari, E. Shi, K. Asanovic, J. Kubiatowicz, and D. Song. PHANTOM: Practical oblivious computation in a secure processor. In ACM CCS, 2013.
-
(2013)
ACM CCS
-
-
Maas, M.1
Love, E.2
Stefanov, E.3
Tiwari, M.4
Shi, E.5
Asanovic, K.6
Kubiatowicz, J.7
Song, D.8
-
16
-
-
84928147292
-
Efficient private file retrieval by combining ORAM and PIR
-
T. Mayberry, E.-O. Blass, and A. H. Chan. Efficient private file retrieval by combining ORAM and PIR. In NDSS, 2014.
-
NDSS
, vol.2014
-
-
Mayberry, T.1
Blass, E.-O.2
Chan, A.H.3
-
17
-
-
70350423055
-
Some open questions related to cuckoo hashing
-
Springer
-
M. Mitzenmacher. Some open questions related to cuckoo hashing. In Algorithms-ESA 2009, pages 1-10. Springer, 2009.
-
(2009)
Algorithms-ESA
, pp. 1-10
-
-
Mitzenmacher, M.1
-
18
-
-
84875100141
-
Memory access pattern protection for resource-constrained devices
-
Springer
-
Y. Nakano, C. Cid, S. Kiyomoto, and Y. Miyake. Memory access pattern protection for resource-constrained devices. In Smart Card Research and Advanced Applications, pages 188-202. Springer, 2013.
-
(2013)
Smart Card Research and Advanced Applications
, pp. 188-202
-
-
Nakano, Y.1
Cid, C.2
Kiyomoto, S.3
Miyake, Y.4
-
20
-
-
70349125738
-
On the computational practicality of private information retrieval
-
R. Sion. On the computational practicality of private information retrieval. In Proc. NDSS, 2007.
-
(2007)
Proc. NDSS
-
-
Sion, R.1
-
21
-
-
84889071325
-
Multi-cloud oblivious storage
-
E. Stefanov and E. Shi. Multi-Cloud Oblivious Storage. In CCS, 2013.
-
(2013)
CCS
-
-
Stefanov, E.1
Shi, E.2
-
24
-
-
84889005645
-
Path ORAM: An extremely simple oblivious RAM protocol
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM: An extremely simple oblivious RAM protocol. In ACM CCS, 2013.
-
(2013)
ACM CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
25
-
-
84869453208
-
PrivateFS: A parallel oblivious file system
-
P. Williams, R. Sion, and A. Tomescu. PrivateFS: A parallel oblivious file system. In CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
Tomescu, A.3
-
26
-
-
84888985277
-
Generalized external interaction with tamper-resistant hardware with bounded information leakage
-
ACM
-
X. Yu, C. W. Fletcher, L. Ren, M. v. Dijk, and S. Devadas. Generalized external interaction with tamper-resistant hardware with bounded information leakage. In Proc. ACM CCSW, pages 23-34. ACM, 2013.
-
(2013)
Proc. ACM CCSW
, pp. 23-34
-
-
Yu, X.1
Fletcher, C.W.2
Ren, L.3
Dijk, M.V.4
Devadas, S.5
|