共 82 条
[11]
Aviram A. F., 2016, INTERACTIVE B TREE C
[13]
Bajaj S., 2011, Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data. SIGMOD'11, P205, DOI DOI 10.1145/1989323.1989346
[14]
Shrinkwrap: Efficient SQL Query Processing in Differentially Private Data Federations
[J].
PROCEEDINGS OF THE VLDB ENDOWMENT,
2018, 12 (03)
:307-320
[15]
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:837-849
[16]
Bing C., 2018, ATOS IT PROVIDER WIN
[17]
PROCHLO: Strong Privacy for Analytics in the Crowd
[J].
PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17),
2017,
:441-459
[18]
Bost R., 2017, IACR CRYPTOLOGY EPRI, V2017, P31
[19]
Σοφοζ - Forward Secure Searchable Encryption
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1143-1154
[20]
Oblivious Parallel RAM and Applications
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II,
2016, 9563
:175-204