Tamrakar et al., 2017
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Tamrakar et al. | The circle game: Scalable private membership test using trusted hardware | |
| US11848914B2 (en) | High-throughput data integrity via trusted computing | |
| Hoang et al. | Hardware-supported ORAM in effect: Practical oblivious search and update on very large dataset | |
| Dauterman et al. | Snoopy: Surpassing the scalability bottleneck of oblivious storage | |
| Ren et al. | Design space exploration and optimization of path oblivious ram in secure processors | |
| Lorch et al. | Shroud: Ensuring private access to {Large-Scale} data in the data center | |
| Blass et al. | Toward robust hidden volumes using write-only oblivious RAM | |
| CN107689869B (en) | User password management method and server | |
| CN110069946B (en) | Safe indexing system based on SGX | |
| GB2579849A (en) | Integrity tree for memory integrity checking | |
| US10929402B1 (en) | Secure join protocol in encrypted databases | |
| Tople et al. | {PRO-ORAM}: Practical {Read-Only} Oblivious {RAM} | |
| Hua et al. | MGX: Near-zero overhead memory protection for data-intensive accelerators | |
| US12287897B2 (en) | Field level encryption searchable database system | |
| Deyannis et al. | Trustav: Practical and privacy preserving malware analysis in the cloud | |
| CN113711194A (en) | Efficient side-channel attack resistant memory encryptor based on key update | |
| Le et al. | A tale of two trees: One writes, and other reads | |
| US10268832B1 (en) | Streaming authenticated encryption | |
| Günther et al. | {GPU-accelerated}{PIR} with {Client-Independent} Preprocessing for {Large-Scale} Applications | |
| Tinoco et al. | {EnigMap}:{External-Memory} Oblivious Map for Secure Enclaves | |
| Rachid et al. | Enclave-based oblivious RAM using Intel’s SGX | |
| Cui et al. | Towards privacy-preserving malware detection systems for android | |
| Mayberry et al. | Multi-client Oblivious RAM secure against malicious servers | |
| Wu et al. | HeX: Encrypted rich queries with forward and backward privacy using trusted hardware | |
| Whelihan et al. | A key-centric processor architecture for secure computing |