-
1
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
ACM, New York
-
Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 48-59. ACM, New York (2010)
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010
, pp. 48-59
-
-
Atallah, M.J.1
Frikken, K.B.2
-
3
-
-
77956778645
-
Secure outsourcing of scientific computations
-
Zelkowitz, M.V. (ed.) Elsevier
-
Atallah, M.J., Pantazopoulos, K., Rice, J.R., Spafford, E.E.: Secure outsourcing of scientific computations. In: Zelkowitz, M.V. (ed.) Trends in Software Engineering. Advances in Computers, vol. 54, pp. 215-272. Elsevier (2002)
-
(2002)
Trends in Software Engineering. Advances in Computers
, vol.54
, pp. 215-272
-
-
Atallah, M.J.1
Pantazopoulos, K.2
Rice, J.R.3
Spafford, E.E.4
-
4
-
-
67650080189
-
Private and cheating-free outsourcing of algebraic computations
-
IEEE Computer Society, Washington, DC
-
Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust, PST 2008, pp. 240-245. IEEE Computer Society, Washington, DC (2008)
-
(2008)
Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust, PST 2008
, pp. 240-245
-
-
Benjamin, D.1
Atallah, M.J.2
-
5
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
May
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy 2007, pp. 321-334 (May 2007)
-
(2007)
IEEE Symposium on Security and Privacy 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
6
-
-
35048868831
-
Server Assisted Signatures Revisited
-
Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
-
Bicakci, K., Baykal, N.: Server Assisted Signatures Revisited. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 143-156. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2964
, pp. 143-156
-
-
Bicakci, K.1
Baykal, N.2
-
7
-
-
84865597567
-
New Algorithms for Secure Outsourcing of Modular Exponentiations
-
Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
-
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New Algorithms for Secure Outsourcing of Modular Exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7459
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
9
-
-
80051994919
-
Memory Delegation
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Chung, K.M., Kalai, Y., Liu, F.H., Raz, R.: Memory Delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151-168. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 151-168
-
-
Chung, K.M.1
Kalai, Y.2
Liu, F.H.3
Raz, R.4
-
10
-
-
37549003336
-
Mapreduce: Simplified data processing on large clusters
-
Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107-113 (2008)
-
(2008)
Commun. ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
11
-
-
84955339164
-
Secure Integration of Asymmetric and Symmetric Encryption Schemes
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
12
-
-
77957005936
-
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
14
-
-
79957974657
-
Implementing Gentry's Fully-Homomorphic Encryption Scheme
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Gentry, C., Halevi, S.: Implementing Gentry's Fully-Homomorphic Encryption Scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129-148. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
15
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
ACM, New York
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, STOC 2008, pp. 113-122. ACM, New York (2008)
-
(2008)
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, STOC 2008
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
16
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89-98 (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
17
-
-
85076484262
-
Outsourcing the decryption of abe ciphertexts
-
USENIX Association, Berkeley
-
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 34. USENIX Association, Berkeley (2011)
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC 2011
, pp. 34
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
18
-
-
24144493423
-
How to Securely Outsource Cryptographic Computations
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Hohenberger, S., Lysyanskaya, A.: How to Securely Outsource Cryptographic Computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
19
-
-
84937432284
-
Secure Server-Aided Signature Generation
-
Kim, K.-C. (ed.) PKC 2001. Springer, Heidelberg
-
Jakobsson, M., Wetzel, S.: Secure Server-Aided Signature Generation. In: Kim, K.-C. (ed.) PKC 2001. LNCS, vol. 1992, pp. 383-401. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1992
, pp. 383-401
-
-
Jakobsson, M.1
Wetzel, S.2
-
20
-
-
77954635558
-
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
21
-
-
70350407157
-
Privacy-Aware Attribute-Based Encryption with User Accountability
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C. (eds.) ISC 2009. Springer, Heidelberg
-
Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-Aware Attribute-Based Encryption with User Accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C. (eds.) ISC 2009. LNCS, vol. 5735, pp. 347-362. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 347-362
-
-
Li, J.1
Ren, K.2
Zhu, B.3
Wan, Z.4
-
22
-
-
74049120601
-
Attribute-based encryption with nonmonotonic access structures
-
ACM, New York
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with nonmonotonic access structures. In: Proceedings of the 14th ACM Conference on Computer andCommunications Security, CCS 2007, pp. 195-203. ACM, New York (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer AndCommunications Security, CCS 2007
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
23
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
-
Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: 40th Annual Symposium on Foundations of Computer Science, pp. 543-553 (1999)
-
(1999)
40th Annual Symposium on Foundations of Computer Science
, pp. 543-553
-
-
Sahai, A.1
-
24
-
-
84865465739
-
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
-
Sahai, A., Seyalioglu, H., Waters, B.: Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 199-217
-
-
Sahai, A.1
Seyalioglu, H.2
Waters, B.3
-
25
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
26
-
-
70350345210
-
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
27
-
-
79952521560
-
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
28
-
-
84862956001
-
Efficient and secure data storage operations for mobile cloud computing
-
ePrint Archive, Report 2011/185
-
Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. Cryptology ePrint Archive, Report 2011/185 (2011)
-
(2011)
Cryptology
-
-
Zhou, Z.1
Huang, D.2
|