Radix Path: A Reduced Bucket Size ORAM for Secure Cloud Storage
暂无分享,去创建一个
[1] Siu-Ming Yiu,et al. HybridORAM: Practical oblivious cloud storage with constant bandwidth , 2018, Inf. Sci..
[2] Abdelfettah Belghith,et al. Practical Suitability and Experimental Assessment of Tree ORAMs , 2018, Secur. Commun. Networks.
[3] Abdelfettah Belghith,et al. Locality Aware Path ORAM: Implementation, Experimentation and Analytical Modeling , 2018, Comput..
[4] Amr El Abbadi,et al. Data Security and Privacy for Outsourced Data in the Cloud , 2018, 2018 IEEE 34th International Conference on Data Engineering (ICDE).
[5] R. Bost. Algorithmes de recherche sur bases de données chiffrées , 2018 .
[6] Marc Sánchez Artigas. Enhancing Tree-Based ORAM Using Batched Request Reordering , 2018, IEEE Trans. Inf. Forensics Secur..
[7] Feifei Li,et al. Oblivious RAM: A Dissection and Experimental Evaluation , 2016, Proc. VLDB Endow..
[8] Elaine Shi,et al. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM , 2016, TCC.
[9] Christopher W. Fletcher. Oblivious RAM: from theory to practice , 2016 .
[10] Yiran Chen,et al. Fork Path: Improving efficiency of ORAM by removing redundant memory accesses , 2015, 2015 48th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[11] Srinivas Devadas,et al. PrORAM: Dynamic prefetcher for Oblivious RAM , 2015, 2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA).
[12] Pjp Paul Teeuwen. Evolution of oblivious RAM schemes , 2015 .
[13] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[14] Andreas Peter,et al. A Survey of Provably Secure Searchable Encryption , 2014, ACM Comput. Surv..
[15] Elaine Shi,et al. Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM , 2014, IACR Cryptol. ePrint Arch..
[16] Elaine Shi,et al. PHANTOM: practical oblivious computation in a secure processor , 2013, CCS.
[17] Srinivas Devadas,et al. Design space exploration and optimization of path oblivious RAM in secure processors , 2013, ISCA.
[18] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[19] Christopher W. Fletcher. Ascend : an architecture for performing secure computation on encrypted data , 2013 .
[20] Srinivas Devadas,et al. A secure processor architecture for encrypted computation on untrusted programs , 2012, STC '12.
[21] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[22] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[23] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[24] B. Eisenberg. On the expectation of the maximum of IID geometric random variables , 2008 .
[25] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[26] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.