메뉴 건너뛰기




Volumn 54, Issue C, 2002, Pages 215-272

Secure outsourcing of scientific computations

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77956778645     PISSN: 00652458     EISSN: None     Source Type: Book Series    
DOI: 10.1016/S0065-2458(01)80019-X     Document Type: Article
Times cited : (224)

References (30)
  • 3
    • 77956726556 scopus 로고
    • Software architecture of ubiquitous scientific computing environments for mobile platforms
    • Department of Computer Sciences
    • Drashansky T., Weerawarana S., Joshi A., Weerasinghe R., and Houstis E.N. Software architecture of ubiquitous scientific computing environments for mobile platforms. CSD-TR-95-032 (1995), Department of Computer Sciences
    • (1995) CSD-TR-95-032
    • Drashansky, T.1    Weerawarana, S.2    Joshi, A.3    Weerasinghe, R.4    Houstis, E.N.5
  • 4
    • 85031767993 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • Advances in Cryptology. Guldwasser (Ed), Springer Verlag, New York
    • Matsumoto T., Kato K., and Imai H. Speeding up secret computations with insecure auxiliary devices. In: Guldwasser (Ed). Advances in Cryptology. Lecture Notes in Computer Science Vol. 658 (1988), Springer Verlag, New York 497-506
    • (1988) Lecture Notes in Computer Science , vol.658 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 9
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • DeMillo R.D. (Ed), Academic Press, San Diego, CA
    • Rivest R.L., Adleman L., and Dertouzos M.L. On data banks and privacy homomorphisms. In: DeMillo R.D. (Ed). Foundations of Secure Computation (1978), Academic Press, San Diego, CA 169-177
    • (1978) Foundations of Secure Computation , pp. 169-177
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3
  • 11
    • 77956774673 scopus 로고    scopus 로고
    • Some active attacks on fast serveraided secret computation protocols for modular exponentiation
    • Hwang S.-J., Chang C.-C., and Yang W.-P. Some active attacks on fast serveraided secret computation protocols for modular exponentiation. Cryptography: Policy and Algorithms, LNCS 1029 (1996) 215-228
    • (1996) Cryptography: Policy and Algorithms, LNCS , vol.1029 , pp. 215-228
    • Hwang, S.-J.1    Chang, C.-C.2    Yang, W.-P.3
  • 13
    • 84957648348 scopus 로고
    • Security and performance of server-aided RSA computation protocols
    • Santa Barbara, CA
    • Lim C.-H., and Lee P.J. Security and performance of server-aided RSA computation protocols. Proceedings 15th. International Cryptology Conference. Santa Barbara, CA (1995) 70-83
    • (1995) Proceedings 15th. International Cryptology Conference , pp. 70-83
    • Lim, C.-H.1    Lee, P.J.2
  • 14
    • 79958247758 scopus 로고
    • Secure addition sequence and its application on the server-aided secret computation protocols
    • Advances in Cryptology. Sebevry, and Zheng (Eds), Springer Verlag, New York
    • Laih C.-S., and Yen S.-M. Secure addition sequence and its application on the server-aided secret computation protocols. In: Sebevry, and Zheng (Eds). Advances in Cryptology. Lecture Notes in Computer Science Vol. 718 (1992), Springer Verlag, New York 219-230
    • (1992) Lecture Notes in Computer Science , vol.718 , pp. 219-230
    • Laih, C.-S.1    Yen, S.-M.2
  • 15
    • 84955578798 scopus 로고
    • Attacks on protocols for server-aided RSA computation
    • EUROCRYPT'92. Rueppel (Ed), Springer Verlag, Berlin
    • Pfitzmann B., and Waidner M. Attacks on protocols for server-aided RSA computation. In: Rueppel (Ed). EUROCRYPT'92. Lecture Notes in Computer Science Vol. 903 (1992), Springer Verlag, Berlin 153-162
    • (1992) Lecture Notes in Computer Science , vol.903 , pp. 153-162
    • Pfitzmann, B.1    Waidner, M.2
  • 16
    • 0005063381 scopus 로고
    • Speeding up Smart Card RSA computations with insecure co-processors
    • North Holland, Amsterdam
    • Quisquater J.-J., and de Soete M. Speeding up Smart Card RSA computations with insecure co-processors. Smart Card 2000 (1991), North Holland, Amsterdam 191-197
    • (1991) Smart Card 2000 , pp. 191-197
    • Quisquater, J.-J.1    de Soete, M.2
  • 22
    • 0024732375 scopus 로고
    • A fast adaptive grid scheme for elliptic partial differential equations
    • Ribbens C.J. A fast adaptive grid scheme for elliptic partial differential equations. ACM Transactions on Mathematical Software 15 (1989) 179-197
    • (1989) ACM Transactions on Mathematical Software , vol.15 , pp. 179-197
    • Ribbens, C.J.1
  • 23
    • 77956755876 scopus 로고
    • Parallelization of adaptive grid domain mapping
    • Rodrique G. (Ed), SIAM, Philadelphia, PA
    • Ribbens C.J. Parallelization of adaptive grid domain mapping. In: Rodrique G. (Ed). Parallel Processing for Scientific Computing (1989), SIAM, Philadelphia, PA 196-200
    • (1989) Parallel Processing for Scientific Computing , pp. 196-200
    • Ribbens, C.J.1
  • 24
    • 0003231932 scopus 로고
    • National Bureau Standards, US Government Printing Office
    • Abramowitz M., and Stegun I.A. Handbook of Mathematical Functions. Applied Mathamatics Series 55 (1964), National Bureau Standards, US Government Printing Office
    • (1964) Applied Mathamatics Series , vol.55
    • Abramowitz, M.1    Stegun, I.A.2
  • 25
    • 0042968690 scopus 로고
    • An adaptive algorithm for multivariate approximation giving optimal convergence rates
    • deBoor C., and Rice J.R. An adaptive algorithm for multivariate approximation giving optimal convergence rates. Journal of Approximation Theory 25 (1979) 337-359
    • (1979) Journal of Approximation Theory , vol.25 , pp. 337-359
    • deBoor, C.1    Rice, J.R.2
  • 30
    • 0004046658 scopus 로고
    • A taxonomy of obfuscating transformations
    • Department Computer Science, University of Auckland
    • Collberg C., Thomborson C., and Low D. A taxonomy of obfuscating transformations. Technical Report 148 (1988), Department Computer Science, University of Auckland
    • (1988) Technical Report 148
    • Collberg, C.1    Thomborson, C.2    Low, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.