作  者
期刊 & 会议
年  份
Chenyu Yan 的引文(116) 排序方式:
DEUCE: Write-Efficient Encryption for Non-Volatile Memories  
Phase Change Memory (PCM) is an emerging Non Volatile Memory (NVM) technology that has the potential to provide scalable high-density memory systems. While the non-volatility of PCM is a desirable pro......
Architectural Support for Programming Languages and Operating Systems  2015
0次引用 0 0
Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM  
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as seen by untrusted storage. Recently, ORAM has been architected into secure processors. A big challenge for hardwa......
Architectural Support for Programming Languages and Operating Systems  2015
0次引用 0 0
Towards fast hardware memory integrity checking with skewed Merkle trees  
Protection of a computer's memory's integrity is crucial in situations where physical attacks on the computer system are a threat. Such attacks can happen during physical break in into a data center o......
Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy  2014
0次引用 0 0
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors  
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private......
Computing Research Repository  2013
2次引用 0 0
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment  
Virtualization is fundamental to cloud computing because it allows multiple operating systems to run simultaneously on a physical machine. However, it also brings a range of security/privacy problems.......
Conference On Computing Frontiers  2013
0次引用 0 0
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors  
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private......
Computing Research Repository  2013
2次引用 0 0
Additive Spanners and Distance and Routing Labeling Schemes for Hyperbolic Graphs  
δ-Hyperbolic metric spaces have been defined by M. Gromov in 1987 via a simple 4-point condition: for any four points u, v, w, x, the two larger of the distance sums d(u, v) + d(w, x), d(u, w) + d(v, ......
Algorithmica  2012
2次引用 0 0
Additive Spanners and Distance and Routing Labeling Schemes for Hyperbolic Graphs  
δ-Hyperbolic metric spaces have been defined by M. Gromov in 1987 via a simple 4-point condition: for any four points u, v, w, x, the two larger of the distance sums d(u, v) + d(w, x), d(u, w) + d(v, ......
Algorithmica  2012
2次引用 0 0
Additive Spanners and Distance and Routing Labeling Schemes for Hyperbolic Graphs  
δ-Hyperbolic metric spaces have been defined by M. Gromov in 1987 via a simple 4-point condition: for any four points u, v, w, x, the two larger of the distance sums d(u, v) + d(w, x), d(u, w) + d(v, ......
Algorithmica  2012
2次引用 0 0
Additive Spanners and Distance and Routing Labeling Schemes for Hyperbolic Graphs  
δ-Hyperbolic metric spaces have been defined by M. Gromov in 1987 via a simple 4-point condition: for any four points u, v, w, x, the two larger of the distance sums d(u, v) + d(w, x), d(u, w) + d(v, ......
Algorithmica  2012
2次引用 0 0

1/12 第一页 上一页 1 2 3 4 5 6 7 下一页
Feedback
Feedback
Feedback
我想反馈:
排行榜