-
1
-
-
77950347409
-
A view of cloud computing
-
April
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing, " Communications of the ACM, vol. 53, no. 4, pp. 50-58, April 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry, "Computing arbitrary functions of encrypted data, " Commun. ACM, vol. 53, no. 3, pp. 97-105, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
5
-
-
0029490594
-
Solution of dense systems of linear equations arising from integral-equation formulations
-
K. Forsman, W. Gropp, L. Kettunen, D. Levine, and J. Salonen, "Solution of dense systems of linear equations arising from integral-equation formulations, " IEEE Antennas and Propagation Magazine, vol. 37, no. 6, pp. 96-100, 1995.
-
(1995)
IEEE Antennas and Propagation Magazine
, vol.37
, Issue.6
, pp. 96-100
-
-
Forsman, K.1
Gropp, W.2
Kettunen, L.3
Levine, D.4
Salonen, J.5
-
6
-
-
84973744454
-
Large dense numerical linear algebra in 1993: The parallel computing influence
-
A. Edelman, "Large dense numerical linear algebra in 1993: The parallel computing influence, " International Journal of High Performance Computing Applications, vol. 7, no. 2, pp. 113-128, 1993.
-
(1993)
International Journal of High Performance Computing Applications
, vol.7
, Issue.2
, pp. 113-128
-
-
Edelman, A.1
-
7
-
-
0037023893
-
An efficient solution of a dense system of linear equations arising in the method-of-moments formulation
-
DOI 10.1002/mop.10274
-
V. Prakash, S. Kwon, and R. Mittra, "An efficient solution of a dense system of linear equations arising in the method-of-moments formulation, " Microwave and Optical Technology Letters, vol. 33, no. 3, pp. 196-200, 2002. (Pubitemid 34504486)
-
(2002)
Microwave and Optical Technology Letters
, vol.33
, Issue.3
, pp. 196-200
-
-
Prakash, V.V.S.1
Kwon, S.J.2
Mittra, R.3
-
8
-
-
2342613038
-
-
Ph.D. dissertation, CERFACS, Toulouse, France
-
B. Carpentieri, "Sparse preconditioners for dense linear systems from electromagnetic applications, " Ph.D. dissertation, CERFACS, Toulouse, France, 2002.
-
(2002)
Sparse Preconditioners for Dense Linear Systems from Electromagnetic Applications
-
-
Carpentieri, B.1
-
9
-
-
84880872502
-
Secure Distributed Linear Algebra in a Constant Number of Rounds
-
Advances in Cryptology - CRYPTO 2001
-
R. Cramer and I. Damgård, "Secure distributed linear algebra in a constant number of rounds, " in Proc. of CRYPTO, 2001, pp. 119-136. (Pubitemid 33317911)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 119-136
-
-
Cramer, R.1
Damgard, I.2
-
10
-
-
33745558215
-
Communication efficient secure linear algebra
-
DOI 10.1007/11681878-27, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
K. Nissim and E. Weinreb, "Communication efficient secure linear algebra, " in Proc. of TCC, 2006, pp. 522-541. (Pubitemid 43979866)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 522-541
-
-
Nissim, K.1
Weinreb, E.2
-
11
-
-
80051896088
-
Secure linear algebra using linearly recurrent sequences
-
E. Kiltz, P. Mohassel, E. Weinreb, and M. K. Franklin, "Secure linear algebra using linearly recurrent sequences, " in Proc. of TCC, 2007.
-
(2007)
Proc. of TCC
-
-
Kiltz, E.1
Mohassel, P.2
Weinreb, E.3
Franklin, M.K.4
-
12
-
-
52049092094
-
Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries
-
P. Mohassel and E. Weinreb, "Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries, " in Proc. of CRYPTO, 2008, pp. 481-496.
-
(2008)
Proc. of CRYPTO
, pp. 481-496
-
-
Mohassel, P.1
Weinreb, E.2
-
13
-
-
79957482465
-
Secure direct and iterative protocols for solving systems of linear equations
-
J. R. Troncoso-Pastoriza, P. Comesaña, and F. Pérez- González, "Secure direct and iterative protocols for solving systems of linear equations, " in Proc. of 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED), 2009, pp. 122-141.
-
(2009)
Proc. of 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED)
, pp. 122-141
-
-
Troncoso-Pastoriza, J.R.1
Comesaña, P.2
Pérez-González, F.3
-
16
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Proc. of EUROCRYPT, 1999, pp. 223-238.
-
(1999)
Proc. of EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
17
-
-
65749112026
-
-
Online at
-
Amazon.com, "Amazon elastic compute cloud, " Online at http://aws.amazon.com/ec2/, 2009.
-
(2009)
Amazon Elastic Compute Cloud
-
-
-
18
-
-
79960854270
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Aug.
-
R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers, " in Proc. of CRYPTO, Aug. 2010.
-
(2010)
Proc. of CRYPTO
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
19
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data, " in Proc. of ICDCS, 2010.
-
(2010)
Proc. of ICDCS
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
20
-
-
77953310709
-
Achieving secure, scalable, and fine-grained access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained access control in cloud computing, " in Proc. of INFOCOM, 2010.
-
(2010)
Proc. of INFOCOM
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
21
-
-
80051902567
-
-
C. Wang, K. Ren, J. Wang, and K. M. R. Urs, "Harnessing the cloud for securely solving large systems of linear equations, " 2011, http://www.ece.iit.edu/-ubisec/cloud/research.html.
-
(2011)
Harnessing the Cloud for Securely Solving Large Systems of Linear Equations
-
-
Wang, C.1
Ren, K.2
Wang, J.3
Urs, K.M.R.4
-
23
-
-
38049146172
-
Batch verification of short signatures
-
volume 4515 of LNCS. Springer-Verlag
-
J. Camenisch, S. Hohenberger, and M. Pedersen, "Batch verification of short signatures, " in Proceedings of Eurocrypt EUROCRYPT, volume 4515 of LNCS. Springer-Verlag, 2007, pp. 243-263.
-
(2007)
Proceedings of Eurocrypt EUROCRYPT
, pp. 243-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.3
-
24
-
-
60349098175
-
New techniques for private stream searching
-
J. Bethencourt, D. X. Song, and B. Waters, "New techniques for private stream searching, " ACM Trans. Inf. Syst. Secur., vol. 12, no. 3, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.3
-
-
Bethencourt, J.1
Song, D.X.2
Waters, B.3
-
25
-
-
77951765127
-
Privacy-preserving gradient-descent methods
-
S. Han, W. K. Ng, L. Wan, and V. C. Lee, "Privacy-preserving gradient-descent methods, " IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 6, pp. 884-899, 2010.
-
(2010)
IEEE Transactions on Knowledge and Data Engineering
, vol.22
, Issue.6
, pp. 884-899
-
-
Han, S.1
Ng, W.K.2
Wan, L.3
Lee, V.C.4
-
26
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
A. C.-C. Yao, "Protocols for secure computations (extended abstract), " in Proc. of FOCS, 1982, pp. 160-164.
-
(1982)
Proc. of FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
-
27
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices, " in Proc of STOC, 2009, pp. 169-178.
-
(2009)
Proc of STOC
, pp. 169-178
-
-
Gentry, C.1
-
28
-
-
77956778645
-
Secure outsourcing of scientific computations
-
Trends in Software Engineering
-
M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, "Secure outsourcing of scientific computations, " Advances in Computers, vol. 54, pp. 216-272, 2001. (Pubitemid 33319801)
-
(2001)
Advances in Computers
, vol.54
, pp. 216-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.4
-
29
-
-
67650080189
-
Private and cheating-free outsourcing of algebraic computations
-
D. Benjamin and M. J. Atallah, "Private and cheating-free outsourcing of algebraic computations, " in Proc. of 6th Conf. on Privacy, Security, and Trust (PST), 2008, pp. 240-245.
-
(2008)
Proc. of 6th Conf. on Privacy, Security, and Trust (PST)
, pp. 240-245
-
-
Benjamin, D.1
Atallah, M.J.2
-
30
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
M. Atallah and K. Frikken, "Securely outsourcing linear algebra computations, " in Proc. of ASIACCS, 2010, pp. 48-59.
-
(2010)
Proc. of ASIACCS
, pp. 48-59
-
-
Atallah, M.1
Frikken, K.2
-
31
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
C. Wang, K. Ren, and J. Wang, "Secure and practical outsourcing of linear programming in cloud computing, " in Proc. of IEEE INFOCOM, 2011.
-
(2011)
Proc. of IEEE INFOCOM
-
-
Wang, C.1
Ren, K.2
Wang, J.3
|