Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Dec 24, 2019 · In this article, we focus on how to apply the expensive ORAM to protect access pattern in IoT devices and propose an ORAM scheme supporting thin ...
In this article, we focus on how to apply the expensive ORAM to protect access pattern in IoT devices and propose an ORAM scheme supporting thin-client.
We further show how to securely deploy ThinORAM in the fog computing environment to achieve oblivious data access to minimum client cost. Experiments show ...
Dec 24, 2019 · We further show how to securely deploy ThinORAM in the fog computing environment to achieve oblivious data access with minimum client cost.
Dive into the research topics of 'ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment'. Together they form a unique fingerprint. Sort ...
People also ask
... ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. IEEE Transactions on Services Computing, 13 (4). pp. 602-612. ISSN 1939-1374.
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. IEEE Trans. Serv. Comput. 13(4): 602-612 (2020). [+][–]. 2010 – 2019. FAQ. see ...
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. 602-612. view. electronic edition via DOI · unpaywalled version · references ...
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. Article. Dec 2019. Yanyu Huang · Bo Li · Zheli Liu · Brij B. Gupta.
This work mainly discussed the security access control technology in fog computing environment, clarified its key parts, and analyzed its effective control ...