Optimizing ORAM and Using It Efficiently for Secure Computation. Gentry, C., Goldman, K. A., Halevi, S., Jutla, C. S., Raykova, M., & Wichs, D. In Cristofaro, E. D. & Wright, M. K., editors, Privacy Enhancing Technologies, volume 7981, of Lecture Notes in Computer Science, pages 1-18, 2013. Springer.
Link
Paper bibtex @inproceedings{conf/pet/GentryGHJ0W13,
added-at = {2017-05-23T00:00:00.000+0200},
author = {Gentry, Craig and Goldman, Kenny A. and Halevi, Shai and Jutla, Charanjit S. and Raykova, Mariana and Wichs, Daniel},
biburl = {https://www.bibsonomy.org/bibtex/29f9b510635c3441e40367fc1a17044b9/dblp},
booktitle = {Privacy Enhancing Technologies},
crossref = {conf/pet/2013},
editor = {Cristofaro, Emiliano De and Wright, Matthew K.},
ee = {https://doi.org/10.1007/978-3-642-39077-7_1},
interhash = {10a196a748a12646de738ad6d265d787},
intrahash = {9f9b510635c3441e40367fc1a17044b9},
isbn = {978-3-642-39076-0},
keywords = {dblp},
pages = {1-18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T16:08:17.000+0200},
title = {Optimizing ORAM and Using It Efficiently for Secure Computation.},
url = {http://dblp.uni-trier.de/db/conf/pet/pets2013.html#GentryGHJ0W13},
volume = 7981,
year = 2013
}
Downloads: 0
{"_id":"kuLtDtwMYAF4N8ndL","bibbaseid":"gentry-goldman-halevi-jutla-raykova-wichs-optimizingoramandusingitefficientlyforsecurecomputation-2013","author_short":["Gentry, C.","Goldman, K. A.","Halevi, S.","Jutla, C. S.","Raykova, M.","Wichs, D."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2017-05-23T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Gentry"],"firstnames":["Craig"],"suffixes":[]},{"propositions":[],"lastnames":["Goldman"],"firstnames":["Kenny","A."],"suffixes":[]},{"propositions":[],"lastnames":["Halevi"],"firstnames":["Shai"],"suffixes":[]},{"propositions":[],"lastnames":["Jutla"],"firstnames":["Charanjit","S."],"suffixes":[]},{"propositions":[],"lastnames":["Raykova"],"firstnames":["Mariana"],"suffixes":[]},{"propositions":[],"lastnames":["Wichs"],"firstnames":["Daniel"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/29f9b510635c3441e40367fc1a17044b9/dblp","booktitle":"Privacy Enhancing Technologies","crossref":"conf/pet/2013","editor":[{"propositions":[],"lastnames":["Cristofaro"],"firstnames":["Emiliano","De"],"suffixes":[]},{"propositions":[],"lastnames":["Wright"],"firstnames":["Matthew","K."],"suffixes":[]}],"ee":"https://doi.org/10.1007/978-3-642-39077-7_1","interhash":"10a196a748a12646de738ad6d265d787","intrahash":"9f9b510635c3441e40367fc1a17044b9","isbn":"978-3-642-39076-0","keywords":"dblp","pages":"1-18","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2019-05-15T16:08:17.000+0200","title":"Optimizing ORAM and Using It Efficiently for Secure Computation.","url":"http://dblp.uni-trier.de/db/conf/pet/pets2013.html#GentryGHJ0W13","volume":"7981","year":"2013","bibtex":"@inproceedings{conf/pet/GentryGHJ0W13,\n added-at = {2017-05-23T00:00:00.000+0200},\n author = {Gentry, Craig and Goldman, Kenny A. and Halevi, Shai and Jutla, Charanjit S. and Raykova, Mariana and Wichs, Daniel},\n biburl = {https://www.bibsonomy.org/bibtex/29f9b510635c3441e40367fc1a17044b9/dblp},\n booktitle = {Privacy Enhancing Technologies},\n crossref = {conf/pet/2013},\n editor = {Cristofaro, Emiliano De and Wright, Matthew K.},\n ee = {https://doi.org/10.1007/978-3-642-39077-7_1},\n interhash = {10a196a748a12646de738ad6d265d787},\n intrahash = {9f9b510635c3441e40367fc1a17044b9},\n isbn = {978-3-642-39076-0},\n keywords = {dblp},\n pages = {1-18},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2019-05-15T16:08:17.000+0200},\n title = {Optimizing ORAM and Using It Efficiently for Secure Computation.},\n url = {http://dblp.uni-trier.de/db/conf/pet/pets2013.html#GentryGHJ0W13},\n volume = 7981,\n year = 2013\n}\n\n","author_short":["Gentry, C.","Goldman, K. A.","Halevi, S.","Jutla, C. S.","Raykova, M.","Wichs, D."],"editor_short":["Cristofaro, E. D.","Wright, M. K."],"key":"conf/pet/GentryGHJ0W13","id":"conf/pet/GentryGHJ0W13","bibbaseid":"gentry-goldman-halevi-jutla-raykova-wichs-optimizingoramandusingitefficientlyforsecurecomputation-2013","role":"author","urls":{"Link":"https://doi.org/10.1007/978-3-642-39077-7_1","Paper":"http://dblp.uni-trier.de/db/conf/pet/pets2013.html#GentryGHJ0W13"},"keyword":["dblp"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Kenny?items=1000","dataSources":["qRWyJpuJ4HEEJs5Rq"],"keywords":["dblp"],"search_terms":["optimizing","oram","using","efficiently","secure","computation","gentry","goldman","halevi","jutla","raykova","wichs"],"title":"Optimizing ORAM and Using It Efficiently for Secure Computation.","year":2013}