1. Workload analysis of a large-scale key-value store
2. Practicing Oblivious Access on Cloud Storage
3. Blackstone , L. , Kamara , S. , and Moataz , T . Revisiting leakage abuse attacks. Cryptology ePrint Archive ( 2019 ). Blackstone, L., Kamara, S., and Moataz, T. Revisiting leakage abuse attacks. Cryptology ePrint Archive (2019).
4. Is There an Oblivious RAM Lower Bound?
5. Bronson , N. , Amsden , Z. , Cabrera , G. , Chakka , P. , Dimov , P. , Ding , H. , Ferris , J. , Giardullo , A. , Kulkarni , S. , Li , H. , Tao : Facebook's distributed data store for the social graph . In 2013 USENIX Annual Technical Conference (USENIXATC 13) ( 2013 ), pp. 49 -- 60 . Bronson, N., Amsden, Z., Cabrera, G., Chakka, P., Dimov, P., Ding, H., Ferris, J., Giardullo, A., Kulkarni, S., Li, H., et al. Tao: Facebook's distributed data store for the social graph. In 2013 USENIX Annual Technical Conference (USENIXATC 13) (2013), pp. 49--60.