{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T21:40:03Z","timestamp":1749591603348,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811027406"},{"type":"electronic","value":"9789811027413"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2741-3_11","type":"book-chapter","created":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T03:27:31Z","timestamp":1474860451000},"page":"130-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space"],"prefix":"10.1007","author":[{"given":"Karin","family":"Sumongkayothin","sequence":"first","affiliation":[]},{"given":"Steven","family":"Gordon","sequence":"additional","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]},{"given":"Komwut","family":"Wipusitwarakun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,27]]},"reference":[{"key":"11_CR1","unstructured":"Boneh, D., Mazieres, D., Popa, R.A.: Remote oblivious storage: making oblivious RAM practical. Tech. rep. MIT-CSAIL-TR-2011-018, Massachusetts Institute of Technology, March 2011. http:\/\/hdl.handle.net\/1721.1\/62006"},{"key":"11_CR2","unstructured":"Dautrich, J., Stefanov, E., Shi, E.: Burst ORAM: minimizing ORAM response times for bursty access patterns. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, pp. 749\u2013764, August 2014"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-39077-7_1","volume-title":"Privacy Enhancing Technologies","author":"C Gentry","year":"2013","unstructured":"Gentry, C., Goldman, K.A., Halevi, S., Julta, C., Raykova, M., Wichs, D.: Optimizing ORAM and using it efficiently for secure computation. In: Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 1\u201318. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-39077-7_1"},{"issue":"3","key":"11_CR4","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-preserving group data access via stateless oblivious RAM simulation. In: Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, Kyoto, Japan, pp. 157\u2013167, January 2012","DOI":"10.1137\/1.9781611973099.14"},{"issue":"8","key":"11_CR6","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1587\/transinf.2015INP0012","volume":"E99\u2013D","author":"S Gordon","year":"2016","unstructured":"Gordon, S., Miyaji, A., Su, C., Sumongkayothin, K.: A matrix based ORAM: design, implementation and experimental analysis. IEICE Trans. Inf. Syst. E99\u2013D(8), 2044\u20132055 (2016)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"11_CR7","unstructured":"Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium, San Diego, CA, February 2012"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Karvelas, N.P., Peter, A., Katzenbeisser, S., Biedermann, S.: Efficient privacy-preserving big data processing through proxy-assisted ORAM. Proc. IACR Cryptology ePrint Archive 2014, 72 (2014)","DOI":"10.1145\/2665943.2665962"},{"key":"11_CR9","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.ins.2013.11.021","volume":"265","author":"C Liu","year":"2014","unstructured":"Liu, C., Zhu, L., Wang, M., Tan, Y.: Search pattern leakage in searchable encryption: attacks and new construction. Inf. Sci. Int. J. 265, 176\u2013188 (2014)","journal-title":"Inf. Sci. Int. J."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Pinkas, B., Reinman, T.: Oblivious RAM revisited. In: Proceedings of the 30th Annual Cryptology Conference, Santa Barbara, CA, pp. 502\u2013519, August 2010","DOI":"10.1007\/978-3-642-14623-7_27"},{"key":"11_CR11","unstructured":"Ren, L., Fletcher, C.W., Yu, X., Kwon, A., van Dijk, M., Devadas, S.: Unified oblivious-RAM: Improving recursive ORAM with locality and pseudorandomness. Proc. IACR Cryptology ePrint Archive 2014, 205 (2014)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-25385-0_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"E Shi","year":"2011","unstructured":"Shi, E., Chan, T.-H.H., Stefanov, E., Li, M.: Oblivious RAM with O((logN)3) worst-case cost. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197\u2013214. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-25385-0_11"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Stefanov, E., van Dijk, M., Shi, E., Fletcher, C.W., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, pp. 299\u2013310, November 2013","DOI":"10.1145\/2508859.2516660"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Shi, E.: Oblivistore: high performance oblivious cloud storage. In: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, pp. 253\u2013267, May 2013","DOI":"10.1109\/SP.2013.25"},{"key":"11_CR15","unstructured":"Stefanov, E., Shi, E., Song, D.X.: Towards practical oblivious RAM. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium, The Internet Society, San Diego, CA, USA, February 2012"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R., Tomescu, A.: PrivateFS: a parallel oblivious file system. In: Proceedings of the ACM Conference on Computer and Communications Security, New York, NY, pp. 977\u2013988, October 2012","DOI":"10.1145\/2382196.2382299"},{"key":"11_CR17","unstructured":"Zhang, J., Ma, Q., Zhang, W., Qiao, D.: KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes. Proc. IACR Cryptology ePrint Archive 2014, 624 (2014)"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2741-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T21:16:31Z","timestamp":1749590191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2741-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811027406","9789811027413"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2741-3_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"27 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairns","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atis2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}