-
1
-
2
-
3
-
4Published 2017Table of Contents: “… Object-Oriented Systems -- Using Oblivious RAM in Genomic Studies -- Towards Efficient and Secure…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2010Table of Contents: “… Delegation of Computation Using Fully Homomorphic Encryption -- Oblivious RAM Revisited -- On Strong…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2013Table of Contents: “… via Oblivious RAM -- Message-Locked Encryption and Secure Deduplication -- Batch Fully Homomorphic…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2017Table of Contents: “… Oblivious RAM Secure Against Malicious Servers -- Breaking and Fixing Mobile App Authentication with OAuth…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2010Table of Contents: “… Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2016Table of Contents: “… Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message…”
Full Text via HEAL-Link
Electronic eBook