Author of the publication

Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space.

, , , , and . ATIS, volume 651 of Communications in Computer and Information Science, page 130-141. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surreptitious Adversarial Examples through Functioning QR Code., , , and . J. Imaging, 8 (5): 122 (2022)M-ORAM: A Matrix ORAM with Log N Bandwidth Cost., , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 3-15. Springer, (2015)Cybersecurity Intrusion Detection with Image Classification Model Using Hilbert Curve., , , and . VISIGRAPP (2): VISAPP, page 325-332. SCITEPRESS, (2024)A Matrix Based ORAM: Design, Implementation and Experimental Analysis., , , and . IEICE Trans. Inf. Syst., 99-D (8): 2044-2055 (2016)Botnet Detection by Integrating Multiple Machine Learning Models., , , and . ICISSP, page 366-373. SCITEPRESS, (2024)Investigating Protection of Deep Learning Visual Features on ECB Encrypted Images., , , and . KSE, page 1-6. IEEE, (2021)M-ORAM Revisited: Security and Construction Updates.. ISPEC, volume 11125 of Lecture Notes in Computer Science, page 521-532. Springer, (2018)Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space., , , , and . ATIS, volume 651 of Communications in Computer and Information Science, page 130-141. (2016)Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices., , , , , and . IEEE Trans. Inf. Forensics Secur., 12 (12): 3024-3038 (2017)OVERSCAN: OAuth 2.0 Scanner for Missing Parameters., , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 221-233. Springer, (2019)