-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathrefs.bib
More file actions
162 lines (139 loc) · 5.36 KB
/
refs.bib
File metadata and controls
162 lines (139 loc) · 5.36 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
%% This BibTeX bibliography file was created using BibDesk.
%% http://bibdesk.sourceforge.net/
%% Created for Rupert Horlick at 2016-01-12 17:05:51 +0000
%% Saved with string encoding Unicode (UTF-8)
@book{CLRS09,
Author = {Thomas H. Cormen and Charles E. Leiserson and Ronald L. Rivest and Clifford Stein},
Date-Added = {2016-01-12 17:02:46 +0000},
Date-Modified = {2016-01-12 17:05:36 +0000},
Edition = {3rd},
Isbn = {0262033844},
Publisher = {The MIT Press},
Title = {{I}ntroduction to {A}lgorithms},
Year = {2009}}
@article{shi2011oblivious,
Author = {Shi, Elaine and Chan, T-H Hubert and Stefanov, Emil and Li, Mingfei},
Date-Added = {2015-10-22 17:36:19 +0000},
Date-Modified = {2015-10-23 08:05:09 +0000},
Journal = {Advances in Cryptology--ASIACRYPT 2011},
Pages = {197--214},
Publisher = {Springer Berlin Heidelberg},
Title = {Oblivious \textsc{RAM} with {$O(\log^3 N)$} worst-case cost},
Year = {2011}}
@inproceedings{moataz2015resizable,
Author = {Moataz, Tarik and Mayberry, Travis and Blass, Erik-Oliver and Chan, Agnes Hui},
Booktitle = {Financial Crypto},
Date-Added = {2015-10-22 17:29:07 +0000},
Date-Modified = {2015-10-23 08:06:55 +0000},
Title = {Resizable tree-based oblivious \textsc{RAM}},
Year = {2015}}
@article{islam2012access,
Author = {Islam, MS and Kuzu, Mehmet and Kantarcioglu, Murat},
Date-Added = {2015-10-22 17:27:22 +0000},
Date-Modified = {2015-10-22 17:27:22 +0000},
Journal = {Network and Distributed System Security Symposium (NDSS{\^a}12)},
Title = {Access pattern disclosure on searchable encryption: Ramification, attack and mitigation},
Year = {2012}}
@article{ren2014unified,
Author = {Ren, Ling and Fletcher, Christopher W and Yu, Xiangyao and Kwon, Albert and van Dijk, Marten and Devadas, Srinivas},
Date-Added = {2015-10-22 17:21:43 +0000},
Date-Modified = {2015-10-23 08:06:29 +0000},
Journal = {IACR Cryptology ePrint Archive},
Pages = {205},
Title = {Unified {Oblivious-RAM}: Improving Recursive \textsc{ORAM} with Locality and Pseudorandomness.},
Volume = {2014},
Year = {2014}}
@inproceedings{stefanov2013path,
Author = {Stefanov, Emil and Van Dijk, Marten and Shi, Elaine and Fletcher, Christopher and Ren, Ling and Yu, Xiangyao and Devadas, Srinivas},
Booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security},
Date-Added = {2015-10-22 17:20:39 +0000},
Date-Modified = {2015-10-23 08:04:41 +0000},
Organization = {ACM},
Pages = {299--310},
Title = {Path \textsc{ORAM}: {A}n extremely simple oblivious \textsc{RAM} protocol},
Year = {2013}}
@article{yu2014enhancing,
title={Enhancing Oblivious \textsc{RAM} Performance Using Dynamic Prefetching.},
author={Yu, Xiangyao and Ren, Ling and Fletcher, Christopher W and Kwon, Albert and van Dijk, Marten and Devadas, Srinivas},
journal={IACR Cryptology ePrint Archive},
volume=2014,
pages=234,
year=2014
}
@mastersthesis{teeuwen2015evolution,
title={Evolution of Oblivious \textsc{RAM} schemes},
author={Teeuwen, Paul},
year=2015,
school={Eindhoven University of Technology}
}
@article{goldreich1996software,
title={Software protection and simulation on oblivious \textsc{RAM}s},
author={Goldreich, Oded and Ostrovsky, Rafail},
journal={Journal of the ACM (JACM)},
volume=43,
number=3,
pages={431--473},
year=1996,
publisher={ACM}
}
@inproceedings{stefanov2013oblivistore,
title={Oblivistore: High performance oblivious cloud storage},
author={Stefanov, Emil and Shi, Elaine},
booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
pages={253--267},
year={2013},
organization={IEEE}
}
@inproceedings{ren2015constants,
title={Constants count: practical improvements to oblivious \textsc{RAM}},
author={Ren, Ling and Fletcher, Christopher and Kwon, Albert and Stefanov, Emil and Shi, Elaine and Van Dijk, Marten and Devadas, Srinivas},
booktitle={24th USENIX Security Symposium (USENIX Security 15)},
pages={415--430},
year=2015
}
@book{ousterhout1985trace,
title={A trace-driven analysis of the UNIX 4.2 BSD file system},
author={Ousterhout, John K and Da Costa, Herve and Harrison, David and Kunze, John A and Kupfer, Mike and Thompson, James G},
volume=19,
year=1985,
publisher={ACM}
}
@techreport{nasuni2013cloud,
title={The state of cloud storage},
author={},
institution={Nasuni},
year=2013,
url={http://www6.nasuni.com/rs/nasuni/images/Nasuni-White-Paper-State-of-Cloud-Storage-2013.pdf}
}
@book{hunt2004pragmatic,
title={Pragmatic Unit Testing in C\# with NUnit},
author={Hunt, A. and Thomas, D. and Pragmatic Programmers (Firm)},
isbn={9780974514024},
lccn={2005273867},
series={Pragmatic Bookshelf Series},
url={https://books.google.co.uk/books?id=a61QAAAAMAAJ},
year={2004},
publisher={Pragmatic Bookshelf}
}
@misc{masliah2000stationarity,
title={Stationarity/Non-stationarity Identification},
author={Masliah, Maurice~R.},
year=2000,
howpublished={\url{http://etclab.mie.utoronto.ca/people/moman/Stationarity/stationarity.html}}
}
@misc{nistautocorr,
title={Autocorrelation plots},
author={Filliben, James~J. and Heckert, Alan},
year=2013,
howpublished={\url{http://www.itl.nist.gov/div898/handbook/eda/section3/autocopl.htm}}
}
@article{porter1980algorithm,
title={An algorithm for suffix stripping},
author={Porter, Martin F},
journal={Program},
volume={14},
number={3},
pages={130--137},
year={1980},
publisher={MCB UP Ltd}
}