-
1
-
-
80955149556
-
-
Manuscript
-
BONEH, D., MAZIERES, D., and POPA, R. A. Remote oblivious storage: Making oblivious RAM practical. Manuscript, http://dspace.mit.edu/bitstream/handle/1721.1/62006/MIT-CSAIL-TR-2011-018.pdf, 2011.
-
(2011)
Remote Oblivious Storage: Making Oblivious RAM Practical
-
-
Boneh, D.1
Mazieres, D.2
Popa, R.A.3
-
2
-
-
82655182943
-
Design implications for enterprise storage systems via multidimensional trace analysis
-
CHEN, Y., SRINIVASAN, K., GOODSON, G., and KATZ, R. Design implications for enterprise storage systems via multidimensional trace analysis. In Proc. ACM SOSP (2011).
-
(2011)
Proc. ACM SOSP
-
-
Chen, Y.1
Srinivasan, K.2
Goodson, G.3
Katz, R.4
-
3
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
CHOW, R., GOLLE, P., JAKOBSSON, M., SHI, E., STADDON, J., MASUOKA, R., and MOLINA, J. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proc. ACM CCSW (2009), pp. 85-90.
-
(2009)
Proc. ACM CCSW
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
4
-
-
79953223285
-
Perfectly secure oblivious RAM without random oracles
-
DAMGÅRD, I., MELDGAARD, S., and NIELSEN, J. B. Perfectly secure oblivious RAM without random oracles. In TCC (2011), pp. 144-163.
-
(2011)
TCC
, pp. 144-163
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
5
-
-
84995516377
-
Compromising privacy in precise query protocols
-
DAUTRICH, J., and RAVISHANKAR, C. Compromising privacy in precise query protocols. In Proc. EDBT (2013).
-
(2013)
Proc. EDBT
-
-
Dautrich, J.1
Ravishankar, C.2
-
6
-
-
84869402047
-
Secure processor architecture for encrypted computation on untrusted programs
-
FLETCHER, C., VAN DIJK, M., and DEVADAS, S. Secure Processor Architecture for Encrypted Computation on Untrusted Programs. In Proc. ACM CCS Workshop on Scalable Trusted Computing (2012), pp. 3-8.
-
(2012)
Proc. ACM CCS Workshop on Scalable Trusted Computing
, pp. 3-8
-
-
Fletcher, C.1
Van Dijk, M.2
Devadas, S.3
-
7
-
-
84907816512
-
Optimizing ORAM and using it efficiently for secure computation
-
GENTRY, C., GOLDMAN, K., HALEVI, S., JULTA, C., RAYKOVA, M., and WICHS, D. Optimizing ORAM and using it efficiently for secure computation. In PETS (2013).
-
(2013)
PETS
-
-
Gentry, C.1
Goldman, K.2
Halevi, S.3
Julta, C.4
Raykova, M.5
Wichs, D.6
-
8
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious rams
-
GOLDREICH, O. Towards a theory of software protection and simulation by oblivious rams. In STOC (1987).
-
(1987)
STOC
-
-
Goldreich, O.1
-
9
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
GOLDREICH, O., and OSTROVSKY, R. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) 43, 3 (1996), 431-473.
-
(1996)
Journal of the ACM (JACM)
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
10
-
-
79960005023
-
Privacy-preserving access of outsourced data via oblivious RAM simulation
-
GOODRICH, M., and MITZENMACHER, M. Privacy-preserving access of outsourced data via oblivious RAM simulation. Automata, Languages and Programming (2011), 576-587.
-
(2011)
Automata, Languages and Programming
, pp. 576-587
-
-
Goodrich, M.1
Mitzenmacher, M.2
-
11
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
GOODRICH, M. T., MITZENMACHER, M., OHRIMENKO, O., and TAMASSIA, R. Privacy-preserving group data access via stateless oblivious RAM simulation. In Proc. SODA (2012), SIAM, pp. 157-167.
-
(2012)
Proc. SODA
, pp. 157-167
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
12
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
ISLAM, M., KUZU, M., and KANTARCIOGLU, M. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Proc. NDSS (2012).
-
(2012)
Proc. NDSS
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
13
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
KUSHILEVITZ, E., LU, S., and OSTROVSKY, R. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Proc. SODA (2012), SIAM, pp. 143-156.
-
(2012)
Proc. SODA
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
14
-
-
84945511204
-
Measurement and analysis of large-scale network file system workloads
-
USENIX Association
-
LEUNG, A. W., PASUPATHY, S., GOODSON, G., and MILLER, E. L. Measurement and analysis of large-scale network file system workloads. In Proc. USENIX ATC (2008), USENIX Association, pp. 213-226.
-
(2008)
Proc. USENIX ATC
, pp. 213-226
-
-
Leung, A.W.1
Pasupathy, S.2
Goodson, G.3
Miller, E.L.4
-
15
-
-
84890416103
-
Shroud: Ensuring private access to large-scale data in the data center
-
LORCH, J. R., PARNO, B., MICKENS, J. W., RAYKOVA, M., and SCHIFFMAN, J. Shroud: Ensuring private access to large-scale data in the data center. FAST (2013), 199-213.
-
(2013)
FAST
, pp. 199-213
-
-
Lorch, J.R.1
Parno, B.2
Mickens, J.W.3
Raykova, M.4
Schiffman, J.5
-
16
-
-
84889002819
-
PHANTOM: Practical oblivious computation in a secure processor
-
MAAS, M., LOVE, E., STEFANOV, E., TIWARI, M., SHI, E., ASANOVIC, K., KUBIATOWICZ, J., and SONG, D. PHANTOM: Practical oblivious computation in a secure processor. In ACM CCS (2013).
-
(2013)
ACM CCS
-
-
Maas, M.1
Love, E.2
Stefanov, E.3
Tiwari, M.4
Shi, E.5
Asanovic, K.6
Kubiatowicz, J.7
Song, D.8
-
17
-
-
85091187696
-
Efficient private file retrieval by combining ORAM and PIR
-
MAYBERRY, T., BLASS, E.-O., and CHAN, A. H. Efficient private file retrieval by combining ORAM and PIR. In NDSS (2014).
-
(2014)
NDSS
-
-
Mayberry, T.1
Blass, E.-O.2
Chan, A.H.3
-
18
-
-
0030714231
-
Private information storage (extended abstract)
-
OSTROVSKY, R., and SHOUP, V. Private information storage (extended abstract). In STOC (1997), pp. 294-303.
-
(1997)
STOC
, pp. 294-303
-
-
Ostrovsky, R.1
Shoup, V.2
-
19
-
-
84881231420
-
Oblivious RAM revisited
-
PINKAS, B., and REINMAN, T. Oblivious RAM revisited. In CRYPTO (2010).
-
(2010)
CRYPTO
-
-
Pinkas, B.1
Reinman, T.2
-
20
-
-
84881169695
-
Design space exploration and optimization of path oblivious RAM in secure processors
-
REN, L., YU, X., FLETCHER, C. W., VAN DIJK, M., and DEVADA S, S. Design space exploration and optimization of path oblivious RAM in secure processors. In Proc. ISCA. 2013.
-
(2013)
Proc. ISCA
-
-
Ren, L.1
Yu, X.2
Fletcher, C.W.3
Van Dijk, M.4
Devadas, S.5
-
22
-
-
84889071325
-
Multi-cloud oblivious storage
-
STEFANOV, E., and SHI, E. Multi-Cloud Oblivious Storage. In CCS (2013).
-
(2013)
CCS
-
-
Stefanov, E.1
Shi, E.2
-
25
-
-
84889005645
-
Path ORAM: An extremely simple oblivious RAM protocol
-
STEFANOV, E., VAN DIJK, M., SHI, E., FLETCHER, C., REN, L., YU, X., and DEVADAS, S. Path ORAM: An extremely simple oblivious RAM protocol. In ACM CCS (2013).
-
(2013)
ACM CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
26
-
-
84875099300
-
Sr-oram: Single round-trip oblivious ram
-
WILLIAMS, P., and SION, R. Sr-oram: Single round-trip oblivious ram. ACNS, industrial track (2012), 19-33.
-
(2012)
ACNS, Industrial Track
, pp. 19-33
-
-
Williams, P.1
Sion, R.2
-
27
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
WILLIAMS, P., SION, R., and CARBUNAR, B. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In Proc. ACM CCS (2008), pp. 139-148.
-
(2008)
Proc. ACM CCS
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
28
-
-
84869453208
-
PrivateFS: A parallel oblivious file system
-
WILLIAMS, P., SION, R., and TOMESCU, A. PrivateFS: A parallel oblivious file system. In CCS (2012).
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
Tomescu, A.3
|