Asian Journal of Information Technology
781 - 790
Carbunar, B. and R. Sion, 2011. Write-once read-many oblivious RAM. IEEE Trans. Inform. Forensics Secur., 6: 1394-1403.CrossRef |
Chor, B., E. Kushilevitz, O. Goldreich and M. Sudan, 1998. Private information retrieval. J. ACM, 45: 965-981.CrossRef | Direct Link |
Goldreich, O. and R. Ostrovsky, 1996. Software protection and simulation on oblivious RAMs. J. ACM., 43: 431-473.
Goodrich, M.T. and M. Mitzenmacher, 2010. Mapreduce parallel cuckoo hashing and oblivious ram simulations. https://arxiv.org/pdf/1007.1259.pdf.
Islam, M.S., M. Kuzu and M. Kantarcioglu, 2012. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. Proceedings of the 19th Annual Network and Distributed System Security Symposium, February 5-8, 2012, San Diego, CA., USA., pp: 1-14.
Kumar, R., J. Novak, B. Pang and A. Tomkins, 2007. On anonymizing query logs via token-based hashing. Proceedings of the 16th International Conference on World Wide Web, May 8-12, 2007, Banff, AB, Canada, pp: 629-638.
Kushilevitz, E., S. Lu and R. Ostrovsky, 2012. On the (in)security of hash-based oblivious RAM and a new balancing scheme. Proceedings of the 23rd Annual ACM-SIAM Symposium on Discrete Algorithms, January 17-19, 2012, Kyoto, Japan, pp: 143-156.
Lee, E.K. and C.A. Thekkath, 1996. Petal: Distributed virtual disks. ACM SIGPLAN Notices, 31: 84-92.CrossRef | Direct Link |
Ostrovsky, R., 1990. Efficient computation on oblivious RAMs. Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, 1990, Baltimore, MD., USA., pp: 514-523.
Pinkas, B. and T. Reinman, 2010. Oblivious RAM revisited. Proceedings of the 30th Annual Cryptology Conference, August 15-19, 2010, Santa Barbara, CA., USA., pp: 502-519.
Ren, L., C.W. Fletcher, X. Yu, M. van Dijk and S. Devadas, 2013. Integrity verification for path oblivious-RAM. Proceedings of the 17th IEEE High Performance Extreme Computing Conference, September 10-12, 2013, Waltham, MA., USA., pp: 1-6.
Sanchez-Artigas, M., 2013. Toward efficient data access privacy in the cloud. IEEE Commun. Mag., 51: 39-45.CrossRef |
Shi, E., T.H.H. Chan, E. Stefanov and M. Li, 2011. Oblivious RAM with O
) worst-case cost. Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, December 4-8, 2011, Seoul, South Korea, pp: 197-214.
Stefanov, E., E. Shi and D. Song, 2011. Towards practical oblivious RAM. http://arxiv.org/pdf/1106.3652.pdf.
Troncoso, C., C. Diaz, O. Dunkelman and B. Preneel, 2007. Traffic analysis attacks on a continuously-observable steganographic file system. Proceedings of the 9th International Workshop on Information Hiding, June 11-13, 2007, Saint Malo, France, pp: 220-236.
Williams, P., R. Sion and B. Carbunar, 2008. Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. Proceedings of the 15th ACM Conference on Computer and Communications Security, October 27-31, 2008, Alexandria, VA., USA., pp: 139-148.