Author of the publication

Multi-client Oblivious RAM Secure Against Malicious Servers.

, , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 686-707. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A graph-theoretic approach to virtual access point correlation., , and . CNS, page 1-9. IEEE, (2017)Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists., , and . IACR Cryptology ePrint Archive, (2013)Scantegrity Mock Election at Takoma Park., , , , , , , , , and 2 other author(s). Electronic Voting, volume P-167 of LNI, page 45-61. GI, (2010)A Study of MAC Address Randomization in Mobile Devices and When it Fails., , , , , , , and . Proc. Priv. Enhancing Technol., 2017 (4): 365-383 (2017)Deterministic, Stash-Free Write-Only ORAM., , , and . CCS, page 507-521. ACM, (2017)Dedicated vs. distributed: A study of mission survivability metrics., , , , and . MILCOM, page 1345-1350. IEEE, (2011)Who Tracks the Trackers?: Circumventing Apple's Anti-Tracking Alerts in the Find My Network., , , , , , , and . WPES@CCS, page 181-186. ACM, (2021)How Much Privacy Does $3, 165 Buy You?, , , , and . PST, page 197-204. IEEE Computer Society, (2017)Toward Robust Hidden Volumes Using Write-Only Oblivious RAM., , , and . ACM Conference on Computer and Communications Security, page 203-214. ACM, (2014)Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists., , and . Proc. Priv. Enhancing Technol., 2015 (2): 81-98 (2015)