Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Qiumao Ma"'
Autor:
Qiumao Ma, Wensheng Zhang
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 6, Iss 20 (2019)
Most of existing ORAM constructions have communication efficiency as the major optimization priority; the server storage efficiency, however, has not received much attention. Motivated by the observation that, the server storage efficiency is as impo
Externí odkaz:
https://doaj.org/article/94300784753541eaac5b6868097beb34
Publikováno v:
Future Internet, Vol 9, Iss 4, p 57 (2017)
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client’s access pattern to outsourced data. TSKT-ORAM organizes each of the server storages as a k-ary tree and adopts XOR-based private inform
Externí odkaz:
https://doaj.org/article/5d09b52554d94d7487326744d6688b54
Autor:
Wensheng Zhang, Qiumao Ma
Publikováno v:
CNS
As the adoption of cloud storage service has been pervasive, more and more attentions have been paid to the related security and privacy risks, among which, data access pattern privacy is an important aspect. Lots of solutions have been proposed, but
Autor:
Qiumao Ma, Wensheng Zhang
Publikováno v:
MILCOM
The oblivious RAM model provides a provable approach to protect a client's data access pattern to cloud storage. Most of existing ORAM schemes have communication efficiency as the major optimization priority, but the server-side storage efficiency ha
Publikováno v:
Future Internet; Volume 9; Issue 4; Pages: 57
Future Internet, Vol 9, Iss 4, p 57 (2017)
Future Internet, Vol 9, Iss 4, p 57 (2017)
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client’s access pattern to outsourced data. TSKT-ORAM organizes each of the server storages as a k-ary tree and adopts XOR-based private inform
Publikováno v:
MILCOM
This paper proposes TSKT-ORAM, a two-server k-ary tree-based Oblivious RAM construction, to hide a client's access pattern to outsourced data. TSKT-ORAM is proved to hide the access pattern with a failure probability of 2−λ, where k = logN (N is t
Publikováno v:
CSCloud
Oblivious RAM (ORAM) is a security-provable approach for protecting clients' access patterns to remote cloud storage. Recently, numerous ORAM constructions have been proposed to improve the communication efficiency of the ORAM model, but little atten
Publikováno v:
Network and System Security ISBN: 9783319462974
NSS
NSS
Oblivious RAM (ORAM) is a security-provable model that can be used to protect a client’s access pattern to remote storage. Existing ORAM constructions were designed mainly for communication efficiency, but the server-side storage efficiency was gen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f1c7fbeee88506d20b5df2dee5e934f0
https://doi.org/10.1007/978-3-319-46298-1_27
https://doi.org/10.1007/978-3-319-46298-1_27
Autor:
Qiumao Ma, Zhiqiang Wu
Publikováno v:
Mitochondrial DNA. Part A, DNA mapping, sequencing, and analysis. 27(5)
The complete chloroplast genome of Capsella grandiflora is finished in this study, which consists of 154 638 base pairs (bp) in size containing a pair of inverted repeats (IRa and IRb) of 26 462 bp each and a small and large single-copies (SSC and LS