Journal articles on the topic 'Oblivious RAM (ORAM)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 16 journal articles for your research on the topic 'Oblivious RAM (ORAM).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wagh, Sameer, Paul Cuff, and Prateek Mittal. "Differentially Private Oblivious RAM." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 64–84. http://dx.doi.org/10.1515/popets-2018-0032.
Full textGancher, Joshua, Adam Groce, and Alex Ledger. "Externally Verifiable Oblivious RAM." Proceedings on Privacy Enhancing Technologies 2017, no. 2 (April 1, 2017): 149–71. http://dx.doi.org/10.1515/popets-2017-0021.
Full textGong, Yunping, Fei Gao, Wenmin Li, Hua Zhang, Zhengping Jin, and Qiaoyan Wen. "LPS-ORAM: Perfectly Secure Oblivious RAM with Logarithmic Bandwidth Overhead." Security and Communication Networks 2022 (August 12, 2022): 1–12. http://dx.doi.org/10.1155/2022/9032828.
Full textChakraborti, Anrin, and Radu Sion. "SqORAM: Read-Optimized Sequential Write-Only Oblivious RAM." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 216–34. http://dx.doi.org/10.2478/popets-2020-0012.
Full textHaider, Syed, and Marten van Dijk. "Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors." Cryptography 3, no. 1 (March 25, 2019): 10. http://dx.doi.org/10.3390/cryptography3010010.
Full textMa, Qiumao, and Wensheng Zhang. "Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency." ICST Transactions on Security and Safety 6, no. 20 (April 29, 2019): 162405. http://dx.doi.org/10.4108/eai.29-4-2019.162405.
Full textGordon, Steven, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, and Komwut Wipusitwarakun. "Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices." IEEE Transactions on Information Forensics and Security 12, no. 12 (December 2017): 3024–38. http://dx.doi.org/10.1109/tifs.2017.2730584.
Full textGuo, Zhong-Yi, Yu-Chi Chen, and Hsiu-Ping Lin. "Oblivious Access for Decentralized Database Systems: A New Asymmetric Framework from Smart Contracts." Symmetry 14, no. 4 (March 25, 2022): 680. http://dx.doi.org/10.3390/sym14040680.
Full textZhang, Jinsheng, Qiumao Ma, Wensheng Zhang, and Daji Qiao. "TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption." Future Internet 9, no. 4 (September 27, 2017): 57. http://dx.doi.org/10.3390/fi9040057.
Full textTueno, Anselme, Florian Kerschbaum, and Stefan Katzenbeisser. "Private Evaluation of Decision Trees using Sublinear Cost." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 266–86. http://dx.doi.org/10.2478/popets-2019-0015.
Full textLiu, Lingtong, Yulong Shen, Shuiguang Zeng, and Zhiwei Zhang. "FO-Sketch: A Fast Oblivious Sketch for Secure Network Measurement Service in the Cloud." Electronics 10, no. 16 (August 20, 2021): 2020. http://dx.doi.org/10.3390/electronics10162020.
Full textZhao, Bo, Zhihong Chen, Hai Lin, and XiangMin Ji. "A Constant Round Write-Only ORAM." Applied Sciences 10, no. 15 (August 3, 2020): 5366. http://dx.doi.org/10.3390/app10155366.
Full textAlam, A. K. M. Mubashwir, Sagar Sharma, and Keke Chen. "SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications." Proceedings on Privacy Enhancing Technologies 2021, no. 1 (January 1, 2021): 5–20. http://dx.doi.org/10.2478/popets-2021-0002.
Full textRiazi, M. Sadegh, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, and Farinaz Koushanfar. "Toward Practical Secure Stable Matching." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (January 1, 2017): 62–78. http://dx.doi.org/10.1515/popets-2017-0005.
Full textAsharov, Gilad, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, and Elaine Shi. "OptORAMa: Optimal Oblivious RAM." Journal of the ACM, October 6, 2022. http://dx.doi.org/10.1145/3566049.
Full textChan, T.-H. Hubert, Kai-Min Chung, Bruce Maggs, and Elaine Shi. "Foundations of Differentially Oblivious Algorithms." Journal of the ACM, August 10, 2022. http://dx.doi.org/10.1145/3555984.
Full text