메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1185-1191

Secure and verifiable outsourcing of large-scale biometric computations

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTING SERVICES; HIGH PROBABILITY; LARGE SCALE COMPUTATION; SECURITY AND PRIVACY; US ECONOMY;

EID: 84862973844     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PASSAT/SocialCom.2011.13     Document Type: Conference Paper
Times cited : (12)

References (23)
  • 1
    • 84862956439 scopus 로고    scopus 로고
    • IT cloud services user survey
    • IT cloud services user survey, pt. 2: Top benefits & challenges. http://blogs.idc.com/ie/?p=210.
    • Pt. 2: Top Benefits & Challenges
  • 10
    • 26444461543 scopus 로고    scopus 로고
    • Searching for high-value rare events with uncheatable grid computing
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • W. Du and M. Goodrich. Searching for high-value rare events with uncheatable grid computing. In Applied Cryptography and Network Security, pages 122-137, 2005. (Pubitemid 41422112)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 122-137
    • Du, W.1    Goodrich, M.T.2
  • 13
    • 84937555419 scopus 로고    scopus 로고
    • Uncheatable Distributed Computations
    • Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
    • P. Golle and I. Mironov. Uncheatable distributed computations. In RSA Conference, pages 425-440, 2001. (Pubitemid 33255180)
    • (2001) Lecture Notes in Computer Science , Issue.2020 , pp. 425-440
    • Golle, P.1    Mironov, I.2
  • 15
    • 55049105395 scopus 로고    scopus 로고
    • Pipelined algorithms to detect cheating in long-term grid computations
    • M. Goodrich. Pipelined algorithms to detect cheating in long-term grid computations. Theoretical Computer Science, 408(2-3):199-207, 2008.
    • (2008) Theoretical Computer Science , vol.408 , Issue.2-3 , pp. 199-207
    • Goodrich, M.1
  • 16
  • 20
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 22
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • C. Wang, K. Ren, and J. Wang. Secure and practical outsourcing of linear programming in cloud computing. In INFOCOM, 2011.
    • (2011) INFOCOM
    • Wang, C.1    Ren, K.2    Wang, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.