Author:
Devadas Srinivas,van Dijk Marten,Fletcher Christopher W.,Ren Ling,Shi Elaine,Wichs Daniel
Publisher
Springer Berlin Heidelberg
Reference52 articles.
1. Lecture Notes in Computer Science;D Apon,2014
2. Blum, M., Evans, W.S., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. In: FOCS (1991)
3. Lecture Notes in Computer Science;Z Brakerski,2011
4. Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13, 143–202 (2000)
5. Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS (2001)
Cited by
99 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Opca: Enabling Optimistic Concurrent Access for Multiple Users in Oblivious Data Storage;IEEE Transactions on Parallel and Distributed Systems;2024-11
2. Tutorial: Information Leakage from Cryptographic Techniques;2024 IEEE 44th International Conference on Distributed Computing Systems Workshops (ICDCSW);2024-07-23
3. Panacea: Non-Interactive and Stateless Oblivious RAM;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
4. XPORAM: A Practical Multi-client ORAM Against Malicious Adversaries;Lecture Notes in Computer Science;2024
5. Secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM;IEEE Transactions on Intelligent Transportation Systems;2023-12