[SW Security] A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains, Privacy Enhancing Technologies Symposium (PETS), July 2020

A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains,

Duc V. Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, and Aniket Kate,

Privacy Enhancing Technologies Symposium (PETS) 2020

0
0

International Papers

HW Security KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object. , 22nd USENIX Security Symposium, Aug 2013 (Acceptance rate: 15.9%)
HW Security Vigilare : Toward Snoop-based Kernel Integrity Monitor, 19th ACM conference on computer and communications security, Oct 2012 (Acceptance rate: 18.9%)