Oblivious

Results: 327



#Item
91

Private and Oblivious Set and Multiset Operations∗ Marina Blanton and Everaldo Aguiar Department of Computer Science and Engineering University of Notre Dame, Notre Dame, IN, USA {mblanton,eaguiar}@nd.edu

Add to Reading List

Source URL: www.cse.nd.edu

Language: English - Date: 2012-04-29 22:08:17
    92

    Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

    Add to Reading List

    Source URL: www.uncg.edu

    Language: English - Date: 2009-10-01 13:53:25
      93

      Unconditionally Secure Oblivious Transfer from Real Network Behavior Paolo Palmieri1,? and Olivier Pereira2 1 Delft University of Technology, Parallel and Distributed Systems Group

      Add to Reading List

      Source URL: www.uclouvain.be

      Language: English - Date: 2013-09-12 08:50:47
        94Cryptography / Secure multi-party computation / Secure two-party computation / Communication complexity / Commitment scheme / Oblivious transfer / Cryptographic protocol / XTR / Transmission Control Protocol

        Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

        Add to Reading List

        Source URL: hunch.net

        Language: English - Date: 2005-03-01 11:04:04
        95

        Cache-Oblivious Algorithms and Data Structures Erik D. Demaine MIT Laboratory for Computer Science, 200 Technology Square, Cambridge, MA 02139, USA,

        Add to Reading List

        Source URL: erikdemaine.org

        Language: English - Date: 2003-04-20 16:04:42
          96Cryptography / Private information retrieval / Oblivious transfer / VEST / Power dividers and directional couplers / Cryptographic primitive / Block cipher / Pir / X Window System / Commitment scheme

          LNCSOn Robust Combiners for Private Information Retrieval and Other Primitives

          Add to Reading List

          Source URL: dcg.ethz.ch

          Language: English - Date: 2014-09-26 08:36:31
          97

          POSTER: Caching Oblivious Memory Access An Extension to the HCRYPT Virtual Machine Michael Brenner and Matthew Smith Distributed Computing Security Group Gottfried Wilhelm Leibniz Universität Hannover, Germany

          Add to Reading List

          Source URL: www.dcsec.uni-hannover.de

          Language: English - Date: 2013-11-12 01:43:30
            98Computing / Computer hardware / Computer data storage / Computer storage media / Non-volatile memory / Computer storage devices / Computer architecture / RAID / IOPS / Solid-state drive / USB flash drive / Log-structured file system

            Gecko: A Contention-Oblivious Design for Cloud Storage Ji-Yong Shin∗, Mahesh Balakrishnan‡, Lakshmi Ganesh§, Tudor Marian†, Hakim Weatherspoon∗ ∗ Cornell University, ‡ Microsoft Research, § UT Austin, † G

            Add to Reading List

            Source URL: www.usenix.org

            Language: English
            99

            Locality Prediction for Oblivious Clients Kevin P. Shanahan, Michael J. Freedman New York University www.coralcdn.org Abstract

            Add to Reading List

            Source URL: iptps05.cs.cornell.edu

            Language: English - Date: 2005-02-01 14:06:19
              100

              Motivation Efficient Priced Oblivious Transfer Optimistic Fair POT Optimistic Fair Priced Oblivious Transfer A. Rial

              Add to Reading List

              Source URL: 2010.africacrypt.com

              Language: English - Date: 2010-05-03 07:27:44
                UPDATE