archives

Browse by Subject: Security and Protection (K.6.5)


Home 

About 

Browse 

Search 

Register 

Subscriptions 

Deposit Papers 

Help
    


This subject category contains 6 entries

Jinsheng, Zhang, Wensheng, Zhang and Daji, Qiao (2013) S-ORAM: A Segmentation-based Oblivious RAM.

Kang, Dae-Ki, Doug, Fuller and Vasant, Honavar (2005) Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation. Technical Report, Computer Science, Iowa State University.

Mahantesh, Hosamani, Harish, Narayanappa and Hridesh, Rajan (2007) Monitoring the Monitor: An Approach Towards Trustworthiness in Service Oriented Architecture. Technical Report 07-07, Computer Science, Iowa State University.

Mahantesh, Hosamani, Harish, Narayanappa and Hridesh, Rajan (2007) Monitoring the Monitor: An Approach Towards Trustworthiness in Service Oriented Architecture. Technical Report 07-07, Computer Science, Iowa State University.

Yang, Ka, Zhang, Jinsheng, Zhang, Wensheng and Qiao, Daji (2013) An Accountability Scheme for Oblivious RAMs. Technical Report, Computer Science, Iowa State University.

Zhang, Jinsheng, Zhang, Wensheng and Qiao, Daji (2014) A Multi-user Oblivious RAM for Outsourced Data. Technical Report, Computer Science, Iowa State University.



Contact site administrator at: ssg@cs.iastate.edu