-
1
-
-
84949968677
-
-
Amazon: Amazon s3 pricing (2014). http://aws.amazon.com/s3/pricing/
-
(2014)
-
-
-
4
-
-
79953223285
-
Perfectly secure oblivious RAM without random oracles
-
In: Ishai, Y. (ed.), Springer, Heidelberg
-
Damgård, I., Meldgaard, S., Nielsen, J.B.: Perfectly secure oblivious RAM without random oracles. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 144–163. Springer, Heidelberg (2011)
-
(2011)
TCC 2011. LNCS
, pp. 144-163
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
5
-
-
84939153055
-
RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification
-
Report 2014/431
-
Fletcher, C.W., Ren, L., Kwon, A., van Dijk, M., Stefanov, E., Devadas, S.: RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification. IACR Cryptology ePrint Archive, Report 2014/431 (2014)
-
(2014)
IACR Cryptology Eprint Archive
-
-
Fletcher, C.W.1
Ren, L.2
Kwon, A.3
van Dijk, M.4
Stefanov, E.5
Devadas, S.6
-
6
-
-
84884946400
-
Optimizing ORAM and using it efficiently for secure computation
-
In: De Cristofaro, E., Wright, M. (eds.), Springer, Heidelberg
-
Gentry, C., Goldman, K.A., Halevi, S., Julta, C., Raykova, M., Wichs, D.: Optimizing ORAM and using it efficiently for secure computation. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 1–18. Springer, Heidelberg (2013)
-
(2013)
PETS 2013. LNCS
, vol.7981
, pp. 1-18
-
-
Gentry, C.1
Goldman, K.A.2
Halevi, S.3
Julta, C.4
Raykova, M.5
Wichs, D.6
-
7
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431–473 (1996)
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
8
-
-
0023547498
-
Towards a theory of software protection and simulation by oblivious RAMs
-
New York, USA
-
Goldreich, O.: Towards a theory of software protection and simulation by oblivious RAMs. In: Proceedings of Symposium on Theory of Computing, New York, USA, pp. 182–194 (1987)
-
(1987)
Proceedings of Symposium on Theory of Computing
, pp. 182-194
-
-
Goldreich, O.1
-
9
-
-
79960005023
-
Privacy-preserving access of outsourced data via oblivious RAM simulation
-
In: Aceto, L., Henzinger, M., Sgall, J. (eds.), Springer, Heidelberg
-
Goodrich, M.T., Mitzenmacher, M.: Privacy-preserving access of outsourced data via oblivious RAM simulation. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 576–587. Springer, Heidelberg (2011)
-
(2011)
ICALP 2011, Part II. LNCS
, vol.6756
, pp. 576-587
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
10
-
-
80955131283
-
Oblivious RAM simulation with efficient worst-case access overhead
-
Chicago, USA
-
Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Oblivious RAM simulation with efficient worst-case access overhead. In: Proceedings of Cloud Computing Security Workshop, Chicago, USA, pp. 95–100 (2011)
-
(2011)
Proceedings of Cloud Computing Security Workshop
, pp. 95-100
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
11
-
-
84860169197
-
Privacypreserving group data access via stateless oblivious RAM simulation
-
Kyoto, Japan
-
Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacypreserving group data access via stateless oblivious RAM simulation. In: Proceedings of the Symposium on Discrete Algorithms, Kyoto, Japan, pp. 157–167 (2012)
-
(2012)
Proceedings of the Symposium on Discrete Algorithms
, pp. 157-167
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
12
-
-
0016930779
-
Behavior of tandem buffers with geometric input and Markovian output
-
Hsu, J., Burke, P.: Behavior of tandem buffers with geometric input and Markovian output. IEEE Trans. Commun. 24(3), 358–361 (1976)
-
(1976)
IEEE Trans. Commun
, vol.24
, Issue.3
, pp. 358-361
-
-
Hsu, J.1
Burke, P.2
-
13
-
-
84860181777
-
On the (In)security of hash-based oblivious RAM and a new balancing scheme
-
Kyoto, Japan
-
Kushilevitz, E., Lu, S., Ostrovsky, R.: On the (in)security of hash-based oblivious RAM and a new balancing scheme. In: Proceedings of Symposium on Discrete Algorithms, Kyoto, Japan, pp. 143–156 (2012)
-
(2012)
Proceedings of Symposium on Discrete Algorithms
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
14
-
-
84928147292
-
Path-PIR: Lower worst-case bounds by combining ORAM and PIR
-
San Diego, USA
-
Mayberry, T., Blass, E.-O., Chan, A.H.: Path-PIR: lower worst-case bounds by combining ORAM and PIR. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, USA (2014)
-
(2014)
Proceedings of the Network and Distributed System Security Symposium
-
-
Mayberry, T.1
Blass, E.-O.2
Chan, A.H.3
-
15
-
-
0030714231
-
Private information storage (Extended abstract)
-
El Paso, USA
-
Ostrovsky, R., Shoup, V.: Private information storage (extended abstract). In: Proceedings of the Symposium on Theory of Computing, El Paso, USA, pp. 294–303 (1997)
-
(1997)
Proceedings of the Symposium on Theory of Computing
, pp. 294-303
-
-
Ostrovsky, R.1
Shoup, V.2
-
16
-
-
77957007201
-
Oblivious RAM revisited
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
Pinkas, B., Reinman, T.: Oblivious RAM revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 502–519. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 502-519
-
-
Pinkas, B.1
Reinman, T.2
-
17
-
-
82955173838
-
Oblivious RAM withO((logN)
-
In: Lee, D.H., Wang, X. (eds.), Springer, Heidelberg
-
3) worst-case cost. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197–214. Springer, Heidelberg (2011)
-
(2011)
ASIACRYPT 2011. LNCS
, vol.7073
, pp. 197-214
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
18
-
-
84889005645
-
Path ORAM: An extremely simple oblivious RAM protocol
-
Stefanov, E., van Dijk, M., Shi, E., Fletcher, C.W., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: Conference on Computer and Communications Security, pp. 299–310 (2013)
-
(2013)
Conference on Computer and Communications Security
, pp. 299-310
-
-
Stefanov, E.1
van Dijk, M.2
Shi, E.3
Fletcher, C.W.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
20
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Alexandra, USA
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: Conference on Computer and Communications Security, Alexandra, USA, pp. 139–148 (2008)
-
(2008)
Conference on Computer and Communications Security
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
|