نتایج جستجو برای: ram reproduction
تعداد نتایج: 75098 فیلتر نتایج به سال:
ISM is a well-proven strategy for analyzing the synergic influences of various attributes to the overall system under study. The unique feature of ISM is that it analyzes the attributes based on their driving power and dependence. In the current study, the ISM has been developed for a leading telecom service provider operating in various global regions having their head quarters in India. The h...
Storage of ram semen in liquid and frozen state, the diluents used for both methods, processing, cooling, freezing and thawing of semen are reviewed. Factors influencing the fertility of stored semen and methods used for improvement are discussed, and fertility results of long-term frozen stored ram semen are also given.
We present the idea of externally verifiable oblivious RAM (ORAM). Our goal is to allow a client and server carrying out an ORAM protocol to have disputes adjudicated by a third party, allowing for the enforcement of penalties against an unreliable or malicious server. We give a security definition that guarantees protection not only against a malicious server but also against a client making f...
State-of-the-art mechanisms for oblivious RAM (ORAM) suffer from significant bandwidth overheads (greater than 100x) that impact the throughput and latency of memory accesses. This renders their deployment in high-performance and bandwidth-constrained applications difficult, motivating the design of lowoverhead approaches for memory access obfuscation. We introduce and formalize the notion of a...
We show that the programs of any classical (as opposed to parallel or interactive) computation model or programming language that satisfies natural postulates of effectiveness (which specialize Gurevich’s Sequential Postulates) can be simulated by a random access machine (RAM) with only constant overhead. In essence, the effectiveness postulates assert the following: states can be represented a...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untrusted memory, such that the access patterns reveal nothing about sensitive data. ORAM is known to have broad applications in secure processor design and secure multi-party computation for big data. Unfortunately, due to a well-known logarithmic lower bound by Goldreich and Ostrovsky (Journal of th...
We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data retention guarantees. Clients can outsource their database to a server with full confidentiality and data access privacy, and, for data retention, the server ensures client access WORM semantics. In general simple confidentiality a...
There have been several attempts recently at using homomorphic encryption to increase the efficiency of Oblivious RAM protocols. One of the most successful has been Onion ORAM, which achieves O(1) communication overhead with polylogarithmic server computation. However, it has a number of drawbacks. It requires a very large block size of B = Ω(log N), with large constants. Although it needs only...
In the setting of cloud computing a user wishes to delegate its data, as well as computations over this data, to a cloud provider. Each computation may read and modify the data, and these modifications should persist between computations. Minding the computational resources of the cloud, delegated computations are modeled as RAM programs. In particular, the delegated computations’ running time ...
T ypical enterprise IT environments consist of numerous independent and distributed servers, networks, and storage devices. To improve efficiency, customers increasingly seek to bring these disparate systems under one umbrella of control. Utility computing facilitates this effort by aggregating such systems into a single, centrally managed pool of resources. To adequately address user expectati...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید