iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.uni-trier.de/pid/127/6232.ris
Provider: Schloss Dagstuhl - Leibniz Center for Informatics Database: dblp computer science bibliography Content:text/plain; charset="utf-8" TY - JOUR ID - DBLP:journals/tods/DautrichR19 AU - Dautrich, Jonathan L., Jr. AU - Ravishankar, Chinya V. TI - Inferring Insertion Times and Optimizing Error Penalties in Time-decaying Bloom Filters. JO - ACM Trans. Database Syst. VL - 44 IS - 2 SP - 7:1 EP - 7:32 PY - 2019// DO - 10.1145/3284552 UR - https://doi.org/10.1145/3284552 ER - TY - CPAPER ID - DBLP:conf/codaspy/DautrichR15 AU - Dautrich, Jonathan L., Jr. AU - Ravishankar, Chinya V. TI - Combining ORAM with PIR to Minimize Bandwidth Costs. BT - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015 SP - 289 EP - 296 PY - 2015// DO - 10.1145/2699026.2699117 UR - https://doi.org/10.1145/2699026.2699117 ER - TY - CPAPER ID - DBLP:conf/codaspy/DautrichR15a AU - Dautrich, Jonathan L., Jr. AU - Ravishankar, Chinya V. TI - Tunably-Oblivious Memory: Generalizing ORAM to Enable Privacy-Efficiency Tradeoffs. BT - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015 SP - 313 EP - 324 PY - 2015// DO - 10.1145/2699026.2699097 UR - https://doi.org/10.1145/2699026.2699097 ER - TY - THES ID - DBLP:phd/basesearch/Dautrich14 AU - Dautrich, Jonathan L., Jr. TI - Achieving Practical Access Pattern Privacy in Data Outsourcing. PY - 2014// UR - http://www.escholarship.org/uc/item/8672k3v6 UR - http://n2t.net/ark:/13030/m5bv8wrr UR - https://www.base-search.net/Record/b9e9ac0d89fdc70d7ce52ec361dd37aaf31f7246606cf150c6f028303a5c8396 ER - TY - CPAPER ID - DBLP:conf/uss/DautrichSS14 AU - Dautrich, Jonathan L., Jr. AU - Stefanov, Emil AU - Shi, Elaine TI - Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns. BT - Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. SP - 749 EP - 764 PY - 2014// UR - https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/dautrich ER - TY - CPAPER ID - DBLP:conf/edbt/DautrichR13 AU - Dautrich, Jonathan L., Jr. AU - Ravishankar, Chinya V. TI - Compromising privacy in precise query protocols. BT - Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013 SP - 155 EP - 166 PY - 2013// DO - 10.1145/2452376.2452397 UR - https://doi.org/10.1145/2452376.2452397 ER - TY - CPAPER ID - DBLP:conf/edbt/DautrichR13a AU - Dautrich, Jonathan L., Jr. AU - Ravishankar, Chinya V. TI - Inferential time-decaying Bloom filters. BT - Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013 SP - 239 EP - 250 PY - 2013// DO - 10.1145/2452376.2452405 UR - https://doi.org/10.1145/2452376.2452405 ER - TY - CPAPER ID - DBLP:conf/dbsec/DautrichR12 AU - Dautrich, Jonathan L., Jr. AU - Ravishankar, Chinya V. TI - Security Limitations of Using Secret Sharing for Data Outsourcing. BT - Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings SP - 145 EP - 160 PY - 2012// DO - 10.1007/978-3-642-31540-4_12 UR - https://doi.org/10.1007/978-3-642-31540-4_12 ER -