-
1
-
-
85180635740
-
-
Amazon
-
Amazon. Amazon Elastic EC2 Pricing, 2013. http://aws.amazon.com/ec2/pricing/.
-
(2013)
Amazon Elastic EC2 Pricing
-
-
-
2
-
-
84864269507
-
PRISM – Privacy-Preserving Search in MapReduce
-
Vigo, Spain, ISBN 978-3-642-31679-1
-
E.-O. Blass, R. Di Pietro, R. Molva, and M. Onen. PRISM – Privacy-Preserving Search in MapReduce. In Proceedings of Privacy Enhancing Technologies, pages 180–200, Vigo, Spain, 2012. ISBN 978-3-642-31679-1.
-
(2012)
Proceedings of Privacy Enhancing Technologies
, pp. 180-200
-
-
Blass, E.-O.1
Di Pietro, R.2
Molva, R.3
Onen, M.4
-
4
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
ISSN 0004-5411
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43 (3):431–473, 1996. ISSN 0004-5411.
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
5
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious ram simulation
-
M.T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving group data access via stateless oblivious ram simulation. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, pages 157–167, 2012.
-
(2012)
Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 157-167
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
6
-
-
80053154222
-
-
Google. A new approach to China, 2010. http://googleblog.blogspot.com/2010/01/new-approach-to-china.html.
-
(2010)
A new approach to China
-
-
-
7
-
-
84947808606
-
NTRU: A ring-based public key cryptosystem
-
Joe Buhler, editor, Springer Berlin, Heidelberg
-
J. Hoffstein, J. Pipher, and J. Silverman. NTRU: A ring-based public key cryptosystem. In Joe Buhler, editor, Algorithmic Number Theory, Lecture Notes in Computer Science. Springer Berlin, Heidelberg, 1998.
-
(1998)
Algorithmic Number Theory, Lecture Notes in Computer Science
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.3
-
9
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
Kyoto, Japan
-
E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM and a new balancing scheme. In Proceedings of Symposium on Discrete Algorithms, pages 143–156, Kyoto, Japan, 2012.
-
(2012)
Proceedings of Symposium on Discrete Algorithms
, pp. 143-156
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
11
-
-
84883276294
-
PIRMAP: Efficient Private Information Retrieval for MapReduce
-
Okinawa, Japan, ISBN 978-3-642-39883-4
-
T. Mayberry, E.-O. Blass, and A.H. Chan. PIRMAP: Efficient Private Information Retrieval for MapReduce. In Proceedings of Financial Cryptography, pages 371–385, Okinawa, Japan, 2013. ISBN 978-3-642-39883-4.
-
(2013)
Proceedings of Financial Cryptography
, pp. 371-385
-
-
Mayberry, T.1
Blass, E.-O.2
Chan, A.H.3
-
13
-
-
84988228700
-
-
Path-PIR. Source Code, 2013. http://pasmac.ccs.neu.edu/resources/pathpir.zip.
-
(2013)
Source Code
-
-
-
15
-
-
82955173838
-
3(N)) Worst-Case Cost
-
pages Seoul, South Korea, ISBN 978-3-642-25384-3
-
3(N)) Worst-Case Cost. In Proceedings of Advances in Cryptology – ASIACRYPT, volume 7073, pages 197–214, Seoul, South Korea, 2011. ISBN 978-3-642-25384-3.
-
(2011)
Proceedings of Advances in Cryptology – ASIACRYPT
, vol.7073
, pp. 197-214
-
-
Shi, E.1
Hubert Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
18
-
-
84889005645
-
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas. Path oram: An extremely simple oblivious ram protocol, 2013. http://eprint.iacr.org/2013/280.pdf.
-
(2013)
Path oram: An extremely simple oblivious ram protocol
-
-
Stefanov, E.1
van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
20
-
-
79251555651
-
Efficient computationally private information retrieval from anonymity or trapdoor groups
-
Boca Raton, USA
-
J. Trostle and A. Parrish. Efficient computationally private information retrieval from anonymity or trapdoor groups. In Proceedings of Conference on Information Security, pages 114–128, Boca Raton, USA, 2010.
-
(2010)
Proceedings of Conference on Information Security
, pp. 114-128
-
-
Trostle, J.1
Parrish, A.2
|