Provider: Schloss Dagstuhl - Leibniz Center for Informatics
Database: dblp computer science bibliography
Content:text/plain; charset="utf-8"
TY - JOUR
ID - DBLP:journals/tods/DautrichR19
AU - Dautrich, Jonathan L., Jr.
AU - Ravishankar, Chinya V.
TI - Inferring Insertion Times and Optimizing Error Penalties in Time-decaying Bloom Filters.
JO - ACM Trans. Database Syst.
VL - 44
IS - 2
SP - 7:1
EP - 7:32
PY - 2019//
DO - 10.1145/3284552
UR - https://doi.org/10.1145/3284552
ER -
TY - CPAPER
ID - DBLP:conf/codaspy/DautrichR15
AU - Dautrich, Jonathan L., Jr.
AU - Ravishankar, Chinya V.
TI - Combining ORAM with PIR to Minimize Bandwidth Costs.
BT - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015
SP - 289
EP - 296
PY - 2015//
DO - 10.1145/2699026.2699117
UR - https://doi.org/10.1145/2699026.2699117
ER -
TY - CPAPER
ID - DBLP:conf/codaspy/DautrichR15a
AU - Dautrich, Jonathan L., Jr.
AU - Ravishankar, Chinya V.
TI - Tunably-Oblivious Memory: Generalizing ORAM to Enable Privacy-Efficiency Tradeoffs.
BT - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015
SP - 313
EP - 324
PY - 2015//
DO - 10.1145/2699026.2699097
UR - https://doi.org/10.1145/2699026.2699097
ER -
TY - THES
ID - DBLP:phd/basesearch/Dautrich14
AU - Dautrich, Jonathan L., Jr.
TI - Achieving Practical Access Pattern Privacy in Data Outsourcing.
PY - 2014//
UR - http://www.escholarship.org/uc/item/8672k3v6
UR - http://n2t.net/ark:/13030/m5bv8wrr
UR - https://www.base-search.net/Record/b9e9ac0d89fdc70d7ce52ec361dd37aaf31f7246606cf150c6f028303a5c8396
ER -
TY - CPAPER
ID - DBLP:conf/uss/DautrichSS14
AU - Dautrich, Jonathan L., Jr.
AU - Stefanov, Emil
AU - Shi, Elaine
TI - Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns.
BT - Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014.
SP - 749
EP - 764
PY - 2014//
UR - https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/dautrich
ER -
TY - CPAPER
ID - DBLP:conf/edbt/DautrichR13
AU - Dautrich, Jonathan L., Jr.
AU - Ravishankar, Chinya V.
TI - Compromising privacy in precise query protocols.
BT - Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013
SP - 155
EP - 166
PY - 2013//
DO - 10.1145/2452376.2452397
UR - https://doi.org/10.1145/2452376.2452397
ER -
TY - CPAPER
ID - DBLP:conf/edbt/DautrichR13a
AU - Dautrich, Jonathan L., Jr.
AU - Ravishankar, Chinya V.
TI - Inferential time-decaying Bloom filters.
BT - Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013
SP - 239
EP - 250
PY - 2013//
DO - 10.1145/2452376.2452405
UR - https://doi.org/10.1145/2452376.2452405
ER -
TY - CPAPER
ID - DBLP:conf/dbsec/DautrichR12
AU - Dautrich, Jonathan L., Jr.
AU - Ravishankar, Chinya V.
TI - Security Limitations of Using Secret Sharing for Data Outsourcing.
BT - Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings
SP - 145
EP - 160
PY - 2012//
DO - 10.1007/978-3-642-31540-4_12
UR - https://doi.org/10.1007/978-3-642-31540-4_12
ER -