2018
DOI: 10.1016/j.ins.2018.02.071
|View full text |Cite
|
Sign up to set email alerts
|

DivORAM: Towards a practical oblivious RAM with variable block size

Abstract: Full bibliographic details must be given when referring to, or quoting from full items including the author's name, the title of the work, publication details where relevant (place, publisher, date), pagination, and for theses or dissertations the awarding institution, the degree type awarded, and the date of the award.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
25
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 60 publications
(25 citation statements)
references
References 36 publications
0
25
0
Order By: Relevance
“…With the improvement and use of enormous information and distributed computing innovation, the huge information condition has advanced higher necessities for information encryption, and the plan of a down to earth and verify open key encryption plot has significant functional centrality. Considering information security in the large information condition, numerous significant plans have been advanced [1][2][3].…”
Section: Related Workmentioning
confidence: 99%
“…With the improvement and use of enormous information and distributed computing innovation, the huge information condition has advanced higher necessities for information encryption, and the plan of a down to earth and verify open key encryption plot has significant functional centrality. Considering information security in the large information condition, numerous significant plans have been advanced [1][2][3].…”
Section: Related Workmentioning
confidence: 99%
“…At the same time, another of his methods [21] makes the routing and the storage and retrieval of resources in a Kademlia network more secure through exploiting reputation techniques for the Sybil attack in the network layer. With the development of public cloud storage [22] and new schemes for outsourced databases recently, the new encryption methods [23,24,25] and a practical oblivious RAM with a variable block size [26] may solve the privacy and security problems caused by the Sybil attack. This paper mainly discusses the attack detection of the physical layer in the WLAN [27], so the application of these algorithms will not be done.…”
Section: Related Workmentioning
confidence: 99%
“…To provide data security, in a confidential and in an authorized encryption, there is a need of protection to the information from an unauthenticated user [1][2][3]. The information required should be made available to the authorized users and to be protected from unauthorized users by creating it unavailable.…”
Section: Introductionmentioning
confidence: 99%