Oblivistore: High performance oblivious cloud storage
E Stefanov, E Shi - 2013 IEEE Symposium on Security and …, 2013 - ieeexplore.ieee.org
We design and build ObliviStore, a high performance, distributed ORAM-based cloud data
store secure in the malicious model. To the best of our knowledge, ObliviStore is the fastest …
store secure in the malicious model. To the best of our knowledge, ObliviStore is the fastest …
Verifiable delegation of computation on outsourced data
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …
server in such a way that, at any moment, the client can ask the server to compute a function …
Systems and methods for preventing unauthorized modification of an operating system
Abstract Systems and methods are provided for preventing unauthorized modification of an
operating system. The system includes an operating system comprised of kernel code for …
operating system. The system includes an operating system comprised of kernel code for …
[图书][B] Trusted computing platforms: design and applications
SW Smith - 2013 - books.google.com
How can one trust computation taking place at a remote site, particularly if a party at that site
might have motivation to subvert this trust? In recent years, industrial efforts have advanced …
might have motivation to subvert this trust? In recent years, industrial efforts have advanced …
Emerging frontiers in embedded security
MM Kermani, M Zhang… - … conference on VLSI …, 2013 - ieeexplore.ieee.org
Computing platforms are expected to be deeply embedded within physical objects and
people, creating an Internet of Things. These embedded computing platforms will enable a …
people, creating an Internet of Things. These embedded computing platforms will enable a …
Reliable physical unclonable function for device authentication
DC Edelstein, SM Gates, EW Kiewra, SV Nitta… - US Patent …, 2013 - Google Patents
Sure also relates to a method for manufacturing a secure device having a physical
unclonable function. The method includes providing an integrated circuit and adding a semi …
unclonable function. The method includes providing an integrated circuit and adding a semi …
Algebraic (trapdoor) one-way functions and their applications
In this paper we introduce the notion of Algebraic (Trapdoor) One Way Functions, which,
roughly speaking, captures and formalizes many of the properties of number-theoretic one …
roughly speaking, captures and formalizes many of the properties of number-theoretic one …
Authentication of integrated circuits
Related US Application Data (60) Provisional application No. 60/373,140, filed on Apr. 16,
2002, provisional application No. 60/387,373, filed on Jun. 10, 2002, provisional application …
2002, provisional application No. 60/387,373, filed on Jun. 10, 2002, provisional application …
Combination of values from a pseudo-random source
MD Yu - US Patent 8,468,186, 2013 - Google Patents
(Continued) result exhibit Super error characteristics (prior to application of any error
correction codes) compared to native PRS output. In some examples, the recombined …
correction codes) compared to native PRS output. In some examples, the recombined …
Towards trustworthy medical devices and body area networks
M Zhang, A Raghunathan, NK Jha - Proceedings of the 50th Annual …, 2013 - dl.acm.org
Implantable and wearable medical devices (IWMDs) are commonly used for diagnosing,
monitoring, and treating various medical conditions. A general trend in IWMDs is towards …
monitoring, and treating various medical conditions. A general trend in IWMDs is towards …