Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Oblidb: Oblivious query processing for secure databases
Hardware enclaves such as Intel SGX are a promising technology for improving the security
of databases outsourced to the cloud. These enclaves provide an execution environment …
of databases outsourced to the cloud. These enclaves provide an execution environment …
Snoopy: Surpassing the scalability bottleneck of oblivious storage
Existing oblivious storage systems provide strong security by hiding access patterns, but do
not scale to sustain high throughput as they rely on a central point of coordination. To …
not scale to sustain high throughput as they rely on a central point of coordination. To …
Sgxonerated: Finding (and partially fixing) privacy flaws in tee-based smart contract platforms without breaking the tee
TEE-based smart contracts are an emerging blockchain architecture, offering fully
programmable privacy with better performance than alternatives like secure multiparty …
programmable privacy with better performance than alternatives like secure multiparty …
Building enclave-native storage engines for practical encrypted databases
Data confidentiality is one of the biggest concerns that hinders enterprise customers from
moving their workloads to the cloud. Thanks to the trusted execution environment (TEE), it is …
moving their workloads to the cloud. Thanks to the trusted execution environment (TEE), it is …
Graphos: Towards oblivious graph processing
We propose GraphOS, a system that allows a client that owns a graph database to
outsource it to an untrusted server for storage and querying. It relies on doubly-oblivious …
outsource it to an untrusted server for storage and querying. It relies on doubly-oblivious …
Towards Practical Oblivious Map
X Cao, W Feng, J Liu, J Zhou, W Fang… - Cryptology ePrint …, 2024 - eprint.iacr.org
Oblivious map (OMAP) is an important component in encrypted databases, utilized to
safeguard against the server inferring sensitive information about client's encrypted key …
safeguard against the server inferring sensitive information about client's encrypted key …
BlackJack: Secure machine learning on IoT devices through hardware-based shuffling
Neural networks are seeing increased use in diverse Internet of Things (IoT) applications
such as healthcare, smart homes and industrial monitoring. Their widespread use makes …
such as healthcare, smart homes and industrial monitoring. Their widespread use makes …
Preserving access pattern privacy in sgx-assisted encrypted search
Outsourcing sensitive data and operations to untrusted cloud providers is considered a
challenging issue. To perform a search operation, even if both the data and the query are …
challenging issue. To perform a search operation, even if both the data and the query are …
[PDF][PDF] Oblidb: Oblivious query processing using hardware enclaves
ObliDB protects against an attacker with full control of the OS who can:● Read and tamper
with all of untrusted memory● Pause and resume enclave execution● Observe access …
with all of untrusted memory● Pause and resume enclave execution● Observe access …
PDoT: private DNS-over-TLS with TEE support
Security and privacy of the Internet Domain Name System (DNS) have been longstanding
concerns. Recently, there is a trend to protect DNS traffic using Transport Layer Security …
concerns. Recently, there is a trend to protect DNS traffic using Transport Layer Security …