بحث بسيط
السجلات المعروضة 1 -- 1 من 1
Implementing and Analyzing a Recursive Technique for Building Path Oblivious RAM
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
It has been demonstrated that encrypting confidential data before storing it is not sufficient because data access patterns can leak significant information about the data itself (Goldreich & Ostrovsky, 1996). Oblivious ...