Analysis of heuristic based access pattern obfuscation. Ulusoy, H., Kantarcioglu, M., Thuraisingham, B. M., Cankaya, E. C., & Pattuk, E. In Bertino, E., Georgakopoulos, D., Srivatsa, M., Nepal, S., & Vinciarelli, A., editors, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013, pages 537–544, 2013. ICST / IEEE.
Analysis of heuristic based access pattern obfuscation [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/colcom/UlusoyKTCP13,
  author    = {Huseyin Ulusoy and
               Murat Kantarcioglu and
               Bhavani M. Thuraisingham and
               Ebru Celikel Cankaya and
               Erman Pattuk},
  editor    = {Elisa Bertino and
               Dimitrios Georgakopoulos and
               Mudhakar Srivatsa and
               Surya Nepal and
               Alessandro Vinciarelli},
  title     = {Analysis of heuristic based access pattern obfuscation},
  booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking,
               Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},
  pages     = {537--544},
  publisher = {{ICST} / {IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.4108/icst.collaboratecom.2013.254199},
  doi       = {10.4108/icst.collaboratecom.2013.254199},
  timestamp = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/colcom/UlusoyKTCP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0