Oblivious

Results: 327



#Item
101Data-Oblivious Graph Algorithms for Secure Computation and Outsourcing Marina Blanton, Aaron Steele, and Mehrdad Aliasgari Department of Computer Science and Engineering University of Notre Dame

Data-Oblivious Graph Algorithms for Secure Computation and Outsourcing Marina Blanton, Aaron Steele, and Mehrdad Aliasgari Department of Computer Science and Engineering University of Notre Dame

Add to Reading List

Source URL: www.cse.nd.edu

Language: English - Date: 2013-04-03 19:41:44
    102Cache-Oblivious String B-trees Michael A. Bender Martin Farach-Colton  Bradley C. Kuszmaul

    Cache-Oblivious String B-trees Michael A. Bender Martin Farach-Colton Bradley C. Kuszmaul

    Add to Reading List

    Source URL: fdmanana.files.wordpress.com

    Language: English - Date: 2010-06-16 06:40:28
      103LNCSImplementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering

      LNCSImplementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering

      Add to Reading List

      Source URL: www.uclouvain.be

      Language: English - Date: 2012-11-06 12:30:22
        104A conference version of part of this work appeared at the proceedings of ISITCommitment and Oblivious Transfer in the Bounded Storage Model with Errors Rafael Dowsley1

        A conference version of part of this work appeared at the proceedings of ISITCommitment and Oblivious Transfer in the Bounded Storage Model with Errors Rafael Dowsley1

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-09-30 08:45:56
          1053rd Workshop on the Intersections of Computer Architecture and Reconfigurable Logic (CARL 2013): Category 2  A High-Performance Oblivious RAM Controller on the Convey HC-2ex Heterogeneous Computing Platform Martin Maas,

          3rd Workshop on the Intersections of Computer Architecture and Reconfigurable Logic (CARL 2013): Category 2 A High-Performance Oblivious RAM Controller on the Convey HC-2ex Heterogeneous Computing Platform Martin Maas,

          Add to Reading List

          Source URL: www.eecs.berkeley.edu

          Language: English - Date: 2014-05-09 20:34:14
            106Resizable Tree-Based Oblivious RAM Tarik Moataz1,∗,§ , Travis Mayberry2,§ , Erik-Oliver Blass3 , and Agnes Hui Chan2 1 2

            Resizable Tree-Based Oblivious RAM Tarik Moataz1,∗,§ , Travis Mayberry2,§ , Erik-Oliver Blass3 , and Agnes Hui Chan2 1 2

            Add to Reading List

            Source URL: fc15.ifca.ai

            Language: English - Date: 2015-01-11 00:33:32
            107Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

            Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

            Add to Reading List

            Source URL: nsl.cse.unt.edu

            Language: English - Date: 2012-01-12 18:51:22
              108UNIVERSITY OF CALIFORNIA RIVERSIDE Size Oblivious Programming of Clusters for Irregular Parallelism  A Dissertation submitted in partial satisfaction

              UNIVERSITY OF CALIFORNIA RIVERSIDE Size Oblivious Programming of Clusters for Irregular Parallelism A Dissertation submitted in partial satisfaction

              Add to Reading List

              Source URL: www.cs.ucr.edu

              Language: English - Date: 2015-09-14 20:29:06
                109Oblivious RAM Revisited Benny Pinkas∗ Dept. of Computer Science University of Haifa Mount Carmel, Haifa 31905, Israel

                Oblivious RAM Revisited Benny Pinkas∗ Dept. of Computer Science University of Haifa Mount Carmel, Haifa 31905, Israel

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2010-06-22 17:30:57
                  110Access Controls for Oblivious and Anonymous Systems SCOTT E. COULL, RedJack MATTHEW GREEN and SUSAN HOHENBERGER, Johns Hopkins University The use of privacy-enhancing cryptographic protocols, such as anonymous credential

                  Access Controls for Oblivious and Anonymous Systems SCOTT E. COULL, RedJack MATTHEW GREEN and SUSAN HOHENBERGER, Johns Hopkins University The use of privacy-enhancing cryptographic protocols, such as anonymous credential

                  Add to Reading List

                  Source URL: www.scottcoull.com

                  Language: English - Date: 2014-03-03 12:03:31