-
1
-
-
84862956439
-
IT cloud services user survey
-
IT cloud services user survey, pt. 2: Top benefits & challenges. http://blogs.idc.com/ie/?p=210.
-
Pt. 2: Top Benefits & Challenges
-
-
-
3
-
-
78149266544
-
Privacy preserving finger code authentication
-
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva. Privacy preserving finger code authentication. In ACM Workshop on Multimedia and Security (MM&Sec), pages 231-240, 2010.
-
(2010)
ACM Workshop on Multimedia and Security (MM&Sec)
, pp. 231-240
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Raimondo, M.D.4
Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Scotti, F.10
Piva, A.11
-
8
-
-
70450231642
-
Experience with BXGrid: A data repository and computing grid for biometrics research
-
H. Bui, M. Kelly, C. Lyon, M. Pasquier, D. Thomas, P. Flynn, and D. Thain. Experience with BXGrid: A data repository and computing grid for biometrics research. Journal of Cluster Computing, 12(4):373- 386, 2009.
-
(2009)
Journal of Cluster Computing
, vol.12
, Issue.4
, pp. 373-386
-
-
Bui, H.1
Kelly, M.2
Lyon, C.3
Pasquier, M.4
Thomas, D.5
Flynn, P.6
Thain, D.7
-
10
-
-
26444461543
-
Searching for high-value rare events with uncheatable grid computing
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
W. Du and M. Goodrich. Searching for high-value rare events with uncheatable grid computing. In Applied Cryptography and Network Security, pages 122-137, 2005. (Pubitemid 41422112)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 122-137
-
-
Du, W.1
Goodrich, M.T.2
-
11
-
-
2442421200
-
Uncheatable grid computing
-
W. Du, J. Jia, M. Mangal, and M. Murugesan. Uncheatable grid computing. In International Conference on Distributed Computing Systems, pages 4-11, 2004.
-
(2004)
International Conference on Distributed Computing Systems
, pp. 4-11
-
-
Du, W.1
Jia, J.2
Mangal, M.3
Murugesan, M.4
-
12
-
-
69949163699
-
Privacy-preserving face recognition
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In Privacy Enchancing Technologies Symposium (PETS), pages 235-253, 2009.
-
(2009)
Privacy Enchancing Technologies Symposium (PETS)
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
13
-
-
84937555419
-
Uncheatable Distributed Computations
-
Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
-
P. Golle and I. Mironov. Uncheatable distributed computations. In RSA Conference, pages 425-440, 2001. (Pubitemid 33255180)
-
(2001)
Lecture Notes in Computer Science
, Issue.2020
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
15
-
-
55049105395
-
Pipelined algorithms to detect cheating in long-term grid computations
-
M. Goodrich. Pipelined algorithms to detect cheating in long-term grid computations. Theoretical Computer Science, 408(2-3):199-207, 2008.
-
(2008)
Theoretical Computer Science
, vol.408
, Issue.2-3
, pp. 199-207
-
-
Goodrich, M.1
-
16
-
-
77951692170
-
Randomized Shellsort: A simple oblivious sorting algorithm
-
M. Goodrich. Randomized Shellsort: A simple oblivious sorting algorithm. In ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1262-1277, 2010.
-
(2010)
ACM-SIAM Symposium on Discrete Algorithms (SODA)
, pp. 1262-1277
-
-
Goodrich, M.1
-
18
-
-
76249117094
-
Agent-based autonomous result verification mechanism in desktop grid systems
-
H. Kim, J. Gil, C. Hwang, H. Yu, and S. Joung. Agent-based autonomous result verification mechanism in desktop grid systems. In Agents and Peer-to-Peer Computing (AP2PC), pages 72-84, 2007.
-
(2007)
Agents and Peer-to-Peer Computing (AP2PC)
, pp. 72-84
-
-
Kim, H.1
Gil, J.2
Hwang, C.3
Yu, H.4
Joung, S.5
-
20
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
C. Wang, K. Ren, and J. Wang. Secure and practical outsourcing of linear programming in cloud computing. In INFOCOM, 2011.
-
(2011)
INFOCOM
-
-
Wang, C.1
Ren, K.2
Wang, J.3
|