نتایج جستجو برای: oram syndrome

تعداد نتایج: 622110  

Journal: :IACR Cryptology ePrint Archive 2014
Ling Ren Christopher W. Fletcher Xiangyao Yu Albert Kwon Marten van Dijk Srinivas Devadas

Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns to untrusted storage. ORAM may be used in secure processors for encrypted computation and/or software protection. While recursive Path ORAM is currently the most practical ORAM for secure processors, it still incurs large performance and energy overhead and is the performance bottleneck of recently proposed secu...

Fereshteh Rezakhanlu, Pupak Derakhshandeh-Peykar, Reza Ebrahimzadeh-Vesal, Seyed kianush Hosseini,

Holt-Oram syndrome (HOS) is a developmental disorder inherited in an autosomal-dominant pattern. Affected organs are the heart and forelimbs with upper extremity skeletal defects and congenital heart malformation. In this study we present three cases of HOS in the same family. In one of these three individuals we detected a transition of C to T (CTG-GTT, V205V) in exon 7 of the TBX5 gene. This ...

Journal: :Cell 2001
Benoit G. Bruneau Georges Nemer Joachim P. Schmitt Frédéric Charron Lynda Robitaille Sophie Caron David A. Conner Manfred Gessler Mona Nemer Christine E. Seidman J. G. Seidman

Heterozygous Tbx5(del/+) mice were generated to study the mechanisms by which TBX5 haploinsufficiency causes cardiac and forelimb abnormalities seen in Holt-Oram syndrome. Tbx5 deficiency in homozygous mice (Tbx5(del/del)) decreased expression of multiple genes and caused severe hypoplasia of posterior domains in the developing heart. Surprisingly, Tbx5 haploinsufficiency also markedly decrease...

Journal: :IACR Cryptology ePrint Archive 2014
Ling Ren Christopher W. Fletcher Albert Kwon Emil Stefanov Elaine Shi Marten van Dijk Srinivas Devadas

We present Ring ORAM, a simple and low-latency ORAM construction that can be parameterized for either small or large client storage. Simply by tuning parameters, Ring ORAM matches or exceeds the performance of the best-known small and large client storage schemes and can achieve a constant factor online bandwidth overhead over insecure systems. We evaluate Ring ORAM in theory and in practice. O...

Journal: :Nephron. Clinical practice 2011
Robert Mactier Simon Davies Chris Dudley Paul Harden Colin Jones Suren Kanagasundaram Andrew Lewington Donald Richardson Maarten Taal Peter Andrews Richard Baker Cormac Breen Neill Duncan Ken Farrington Richard Fluck Colin Geddes David Goldsmith Nic Hoenich Stephen Holt Alan Jardine Sarah Jenkins Mick Kumwenda Elizabeth Lindley Mark Macgregor Ashraf Mikhail Edward Sharples Badi Shrestha Rajesh Shrivastava Simon Steddon Graham Warwick Martin Wilkie Graham Woodrow Mark Wright

Robert Mactier, Simon Davies, Chris Dudley, Paul Harden, Colin Jones, Suren Kanagasundaram, Andrew Lewington, Donald Richardson, Maarten Taal, Peter Andrews Richard Baker, Cormac Breen, Neill Duncan, Ken Farrington, Richard Fluck, Colin Geddes, David Goldsmith, Nic Hoenich, Stephen Holt, Alan Jardine, Sarah Jenkins, Mick Kumwenda, Elizabeth Lindley, Mark MacGregor, Ashraf Mikhail, Edward Sharpl...

Journal: :Physical review letters 2002
Adán Cabello

Cirel'son inequality states that the absolute value of the combination of quantum correlations appearing in the Clauser-Horne-Shimony-Holt (CHSH) inequality is bound by 2 square root of (2). It is shown that the correlations of two qubits belonging to a three-qubit system can violate the CHSH inequality beyond 2 square root of (2). Such a violation is not in conflict with Cirel'son's inequality...

Journal: :Physical review letters 2005
J B Altepeter E R Jeffrey P G Kwiat S Tanzilli N Gisin A Acín

Here we present experimental realizations of two new entanglement detection methods: a three-measurement Bell inequality inequivalent to the Clauser-Horne-Shimony-Holt inequality and a nonlinear Bell-type inequality based on the negativity measure. In addition, we provide an experimental and theoretical comparison between these new methods and several techniques already in use: the traditional ...

Journal: :IACR Cryptology ePrint Archive 2014
Xiangyao Yu Ling Ren Christopher W. Fletcher Albert Kwon Marten van Dijk Srinivas Devadas

Oblivious RAM (ORAM) is an established technique to hide the access pattern to an untrusted storage system. With ORAM, a curious adversary cannot tell what data address the user is accessing when observing the bits moving between the user and the storage system. All existing ORAM schemes achieve obliviousness by adding redundancy to the storage system, i.e., each access is turned into multiple ...

Journal: :CoRR 2017
Syed Kamran Haider Marten van Dijk

Oblivious RAM (ORAM) is a renowned technique to hide the access paŠerns of an application to an untrusted memory. According to the standard ORAM de€nition presented by Goldreich and Ostrovsky, in order for two ORAM access sequences to be computationally indistinguishable, the lengths of these sequences must be identically distributed. An artifact of this de€nition is that it does not apply to m...

Journal: :CoRR 2017
Manuel Costa Lawrence Esswood Olga Ohrimenko Felix Schuster Sameer Wagh

Modern processors, e.g., Intel SGX, allow applications to isolate secret code and data in encrypted memory regions called enclaves. While encryption effectively hides the contents of memory, the sequence of address references issued by the secret code leaks information. This is a serious problem because these leaks can easily break the confidentiality guarantees of enclaves. In this paper, we e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید