Oblivious

Results: 327



#Item
281Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors Ling Ren, Xiangyao Yu, Christopher W. Fletcher ∗, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, yxy, c

Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors Ling Ren, Xiangyao Yu, Christopher W. Fletcher ∗, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, yxy, c

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-04-22 20:42:08
2821  Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.edu

1 Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.edu

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-08-04 20:04:19
283How to be Successful at a Job Fair What to Wear to a Job Fair Job seekers are not oblivious to the fact that dressing for success is important for landing new employment. In fact, professional recruiters and hiring manag

How to be Successful at a Job Fair What to Wear to a Job Fair Job seekers are not oblivious to the fact that dressing for success is important for landing new employment. In fact, professional recruiters and hiring manag

Add to Reading List

Source URL: www.dlt.ri.gov

Language: English - Date: 2014-07-24 14:23:10
284Cache-Oblivious String B-trees Michael A. Bender Martin Farach-Colton  Bradley C. Kuszmaul

Cache-Oblivious String B-trees Michael A. Bender Martin Farach-Colton Bradley C. Kuszmaul

Add to Reading List

Source URL: fdmanana.files.wordpress.com

Language: English - Date: 2010-06-16 06:40:28
285Communication Efficient Gaussian Elimination with Partial Pivoting using a Shape Morphing Data Layout∗ Grey Ballard James Demmel

Communication Efficient Gaussian Elimination with Partial Pivoting using a Shape Morphing Data Layout∗ Grey Ballard James Demmel

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-04-26 14:00:27
286References 1. ABA Bank Card Standard,

References 1. ABA Bank Card Standard, "Management and Use of Personal Information Numbers, " Aids from ABA, Catalog no[removed], American Bankers Association, [removed]ABA Document 4.3, "Key Management Standard," American

Add to Reading List

Source URL: www.ssl.stu.neva.ru

Language: English - Date: 2001-07-17 16:00:00
287Mr.Oblivious  Mark Gonyea Mr.Oblivious

Mr.Oblivious Mark Gonyea Mr.Oblivious

Add to Reading List

Source URL: www.mroblivious.com

- Date: 2012-08-26 13:01:05
    288Cryptographic techniques for privacy-preserving data mining Benny Pinkas HP Labs [removed]

    Cryptographic techniques for privacy-preserving data mining Benny Pinkas HP Labs [removed]

    Add to Reading List

    Source URL: www.pinkas.net

    Language: English - Date: 2004-01-09 00:12:19
    289Secure Computation of the kth-Ranked Element Gagan Aggarwal? , Nina Mishra?? , and Benny Pinkas? ? ? Abstract. Given two or more parties possessing large, confidential datasets, we consider the problem of securely comput

    Secure Computation of the kth-Ranked Element Gagan Aggarwal? , Nina Mishra?? , and Benny Pinkas? ? ? Abstract. Given two or more parties possessing large, confidential datasets, we consider the problem of securely comput

    Add to Reading List

    Source URL: www.pinkas.net

    Language: English - Date: 2004-05-12 12:29:01
    290Secure Hamming Distance Based Computation and Its Applications Ayman Jarrous and Benny Pinkas University of Haifa  Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming

    Secure Hamming Distance Based Computation and Its Applications Ayman Jarrous and Benny Pinkas University of Haifa Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming

    Add to Reading List

    Source URL: www.pinkas.net

    Language: English - Date: 2009-04-09 09:23:00