Analysis of heuristic based access pattern obfuscation. Ulusoy, H., Kantarcioglu, M., Thuraisingham, B., Cankaya, E. C., & Pattuk, E. In Bertino, E., Georgakopoulos, D., Srivatsa, M., Nepal, S., & Vinciarelli, A., editors, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013, pages 537–544, 2013. ICST / IEEE.
Analysis of heuristic based access pattern obfuscation [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/colcom/UlusoyKTCP13,
  author       = {Huseyin Ulusoy and
                  Murat Kantarcioglu and
                  Bhavani Thuraisingham and
                  Ebru Celikel Cankaya and
                  Erman Pattuk},
  editor       = {Elisa Bertino and
                  Dimitrios Georgakopoulos and
                  Mudhakar Srivatsa and
                  Surya Nepal and
                  Alessandro Vinciarelli},
  title        = {Analysis of heuristic based access pattern obfuscation},
  booktitle    = {9th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},
  pages        = {537--544},
  publisher    = {{ICST} / {IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2013.254199},
  doi          = {10.4108/ICST.COLLABORATECOM.2013.254199},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/UlusoyKTCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0