共 56 条
[1]
OBLIVIATE: A Data Oblivious File System for Intel SGX
[J].
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018),
2018,
[2]
[Anonymous], 2017, P P 10 EUROPEAN WORK, DOI [DOI 10.1145/3065913.3065915, 10.1145/3065913.3065915]
[3]
[Anonymous], 2014, IACR Cryptol. ePrint Arch.
[4]
Apon D, 2014, LECT NOTES COMPUT SC, V8383, P131, DOI 10.1007/978-3-642-54631-0_8
[5]
Asonov D, 2003, LECT NOTES COMPUT SC, V2482, P209
[6]
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:837-849
[7]
Blass Erik-Oliver, 2017, Applied Cryptography and Network Security. 15th International Conference, ACNS 2017. Proceedings: LNCS 10355, P686, DOI 10.1007/978-3-319-61204-1_34
[8]
Oblivious Parallel RAM and Applications
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II,
2016, 9563
:175-204
[9]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679
[10]
Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs
[J].
THEORY OF CRYPTOGRAPHY, TCC 2017, PT II,
2017, 10678
:72-107