-
1
-
-
80051894689
-
Harnessing the cloud for securely solving large-scale systems of linear equations
-
C. Wang, K. Ren, J. Wang, and K. Mahendra Raje Urs, "Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations," Proc. 31st Int'l Conf. Distributed Computing Systems (ICDCS), pp. 549-558, 2011.
-
(2011)
Proc. 31st Int'l Conf. Distributed Computing Systems (ICDCS)
, pp. 549-558
-
-
Wang, C.1
Ren, K.2
Wang, J.3
Mahendra Raje Urs, K.4
-
2
-
-
77950347409
-
A view of cloud computing
-
Apr.
-
M. Armbrust et al., "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
-
(2010)
Comm ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
-
4
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry, "Computing Arbitrary Functions of Encrypted Data," Comm. ACM, vol. 53, no. 3, pp. 97-105, 2010.
-
(2010)
Comm ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
5
-
-
0029490594
-
Solution of dense systems of linear equations arising from integral-equation formulations
-
Dec
-
K. Forsman, W. Gropp, L. Kettunen, D. Levine, and J. Salonen, "Solution of Dense Systems of Linear Equations Arising from Integral-Equation Formulations," IEEE Antennas and Propagation Magazine, vol. 37, no. 6, pp. 96-100, Dec. 1995.
-
(1995)
IEEE Antennas and Propagation Magazine
, vol.37
, Issue.6
, pp. 96-100
-
-
Forsman, K.1
Gropp, W.2
Kettunen, L.3
Levine, D.4
Salonen, J.5
-
6
-
-
84973744454
-
Large dense numerical linear algebra in 1993: The parallel computing influence
-
A. Edelman, "Large Dense Numerical Linear Algebra in 1993: The Parallel Computing Influence," Int'l J. High Performance Computing Applications, vol. 7, no. 2, pp. 113-128, 1993.
-
(1993)
Int'l J. High Performance Computing Applications
, vol.7
, Issue.2
, pp. 113-128
-
-
Edelman, A.1
-
7
-
-
0037023893
-
An efficient solution of a dense system of linear equations arising in the method-of-moments formulation
-
DOI 10.1002/mop.10274
-
V. Prakash, S. Kwon, and R. Mittra, "An Efficient Solution of a Dense System of Linear Equations Arising in the Method-of-Moments Formulation," Microwave and Optical Technology Letters, vol. 33, no. 3, pp. 196-200, 2002. (Pubitemid 34504486)
-
(2002)
Microwave and Optical Technology Letters
, vol.33
, Issue.3
, pp. 196-200
-
-
Prakash, V.V.S.1
Kwon, S.J.2
Mittra, R.3
-
10
-
-
33745558215
-
Communication efficient secure linear algebra
-
DOI 10.1007/11681878-27, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
K. Nissim and E. Weinreb, "Communication Efficient Secure Linear Algebra," Proc. Third Conf. Theory of Cryptography (TCC), pp. 522-541, 2006. (Pubitemid 43979866)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 3876
, pp. 522-541
-
-
Nissim, K.1
Weinreb, E.2
-
11
-
-
38049077335
-
Secure linear algebra using linearly recurrent sequences
-
E. Kiltz, P. Mohassel, E. Weinreb, and M.K. Franklin, "Secure Linear Algebra Using Linearly Recurrent Sequences," Proc. Fourth Conf. Theory of Cryptography (TCC), pp. 291-310, 2007.
-
(2007)
Proc. Fourth Conf. Theory of Cryptography (TCC)
, pp. 291-310
-
-
Kiltz, E.1
Mohassel, P.2
Weinreb, E.3
Franklin, M.K.4
-
12
-
-
52049092094
-
Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries
-
P. Mohassel and E. Weinreb, "Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries," CRYPTO: Proc. 28th Ann. Int'l Cryptology Conf., pp. 481-496, 2008.
-
(2008)
CRYPTO: Proc. 28th Ann. Int'l Cryptology Conf
, pp. 481-496
-
-
Mohassel, P.1
Weinreb, E.2
-
13
-
-
79957482465
-
Secure direct and iterative protocols for solving systems of linear equations
-
J.R. Troncoso-Pastoriza, P. Comesañ a, and F. Pérez- González, "Secure Direct and Iterative Protocols for Solving Systems of Linear Equations," Proc. First Int'l Workshop Signal Processing in the EncryptEd Domain (SPEED), pp. 122-141, 2009.
-
(2009)
Proc. First Int'l Workshop Signal Processing in the EncryptEd Domain (SPEED)
, pp. 122-141
-
-
Troncoso-Pastoriza, J.R.1
Comesaña, P.2
Pérez-González, F.3
-
18
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno, "Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers," CRYPTO: Proc. 30th Ann. Conf. Advances in Cryptology, pp. 465-482, 2010.
-
(2010)
CRYPTO: Proc. 30th Ann. Conf. Advances in Cryptology
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
19
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data," Proc. IEEE 30th Int'l Conf. Distributed Computing Systems (ICDCS), pp. 253-262, 2010.
-
(2010)
Proc IEEE 30th Int'l Conf. Distributed Computing Systems (ICDCS)
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
20
-
-
77953310709
-
Achieving secure, scalable, and fine-grained access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Access Control in Cloud Computing," Proc. IEEE INFOCOM, pp. 534-542, 2010.
-
(2010)
Proc IEEE INFOCOM
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
21
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
C. Wang, K. Ren, S. Yu, and K. Mahendra Raje Urs, "Achieving Usable and Privacy-Assured Similarity Search Over Outsourced Cloud Data," Proc. IEEE INFOCOM, pp. 451-459, 2012.
-
(2012)
Proc IEEE INFOCOM
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Mahendra Raje Urs, K.4
-
22
-
-
0004116989
-
-
second ed MIT press
-
T.H. Cormen, C.E. Leiserson, R.L. Rivest, and C. Stein, Introduction to Algorithms, second ed. MIT press, 2008.
-
(2008)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
23
-
-
67650080189
-
Private and cheating-free outsourcing of algebraic computations
-
D. Benjamin and M.J. Atallah, "Private and Cheating-Free Outsourcing of Algebraic Computations," Proc. Sixth Conf. Privacy, Security, and Trust (PST), pp. 240-245, 2008.
-
(2008)
Proc. Sixth Conf. Privacy, Security, and Trust (PST)
, pp. 240-245
-
-
Benjamin, D.1
Atallah, M.J.2
-
26
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
Advances in Cryptology - EUROCRYPT '98
-
M. Bellare, J. Garay, and T. Rabin, "Fast Batch Verification for Modular Exponentiation and Digital Signatures," Eurocrypt: Proc. Int'l Conf. the Theory and Application of Cryptographic Techniques, pp. 236-250, 1998. (Pubitemid 128081489)
-
(1998)
Lecture Notes In Computer Science
, Issue.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
27
-
-
38049146172
-
Batch verification of short signatures
-
J. Camenisch, S. Hohenberger, and M. Pedersen, "Batch Verification of Short Signatures," EUROCRYPT: Proc. 26th Ann. Int'l Conf. Advances in Cryptology, pp. 243-263, 2007.
-
(2007)
EUROCRYPT: Proc. 26th Ann. Int'l Conf. Advances in Cryptology
, pp. 243-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.3
-
28
-
-
60349098175
-
New techniques for private stream searching
-
article 16
-
J. Bethencourt, D.X. Song, and B. Waters, "New Techniques for Private Stream Searching," ACM Trans. Information Systems Security, vol. 12, no. 3, article 16, 2009.
-
(2009)
ACM Trans. Information Systems Security
, vol.12
, Issue.3
-
-
Bethencourt, J.1
Song, D.X.2
Waters, B.3
-
29
-
-
77951765127
-
Privacy-preserving gradient-descent methods
-
June
-
S. Han, W.K. Ng, L. Wan, and V.C. Lee, "Privacy-Preserving Gradient-Descent Methods," IEEE Trans. Knowledge and Data Eng., vol. 22, no. 6, pp. 884-899, June 2010.
-
(2010)
IEEE Trans. Knowledge and Data Eng
, vol.22
, Issue.6
, pp. 884-899
-
-
Han, S.1
Ng, W.K.2
Wan, L.3
Lee, V.C.4
-
32
-
-
77956778645
-
Secure outsourcing of scientific computations
-
Trends in Software Engineering
-
M.J. Atallah, K.N. Pantazopoulos, J.R. Rice, and E.H. Spafford, "Secure Outsourcing of Scientific Computations," Advances in Computers, vol. 54, pp. 216-272, 2001. (Pubitemid 33319801)
-
(2001)
Advances In Computers
, vol.54
, pp. 216-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.4
-
33
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
C. Wang, K. Ren, and J. Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing," Proc. IEEE INFOCOM, pp. 820-828, 2011.
-
(2011)
Proc IEEE INFOCOM
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
34
-
-
84862973844
-
Secure and verifiable outsourcing of large-scale biometric computations
-
M. Blanton, Y. Zhang, and K.B. Frikken, "Secure and Verifiable Outsourcing of Large-Scale Biometric Computations," Proc. IEEE Third Int'l Conf. Privacy, Security, Risk, and Trust (PASSAT), pp. 1185-1191, 2011.
-
(2011)
Proc IEEE Third Int'l Conf. Privacy, Security, Risk, and Trust (PASSAT)
, pp. 1185-1191
-
-
Blanton, M.1
Zhang, Y.2
Frikken, K.B.3
-
35
-
-
36949019777
-
Oblivious neural network computing via homomorphic encryption
-
C. Orlandi, A. Piva, and M. Barni, "Oblivious Neural Network Computing via Homomorphic Encryption," EURASIP J. Information Security, vol. 2007, pp. 1-10, 2007.
-
(2007)
EURASIP J. Information Security
, vol.2007
, pp. 1-10
-
-
Orlandi, C.1
Piva, A.2
Barni, M.3
-
36
-
-
44649144617
-
Privacy-preserving linear fisher discriminant analysis
-
DOI 10.1007/978-3-540-68125-0-14, Advances in Knowledge Discovery and Data Mining - 12th Pacific-Asia Conference, PAKDD 2008, Proceedings
-
S. Han and W.K. Ng, "Privacy-Preserving Linear Fisher Discriminant Analysis," Proc. 12th Pacific-Asia Conf. Advances in Knowledge Discovery and Data Mining, pp. 136-147, 2008. (Pubitemid 351776313)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNAI 5012
, pp. 136-147
-
-
Han, S.1
Ng, W.K.2
-
37
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
S. Goldwasser, Y.T. Kalai, and G.N. Rothblum, "Delegating Computation: Interactive Proofs for Muggles," Proc. ACM Symp. Theory of Computing (STOC), pp. 113-122, 2008.
-
(2008)
Proc ACM Symp. Theory of Computing (STOC)
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
38
-
-
84937555419
-
Uncheatable distributed computations
-
Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
-
P. Golle and I. Mironov, "Uncheatable Distributed Computations," CT-RSA: Proc. Conf. Topics in Cryptology: The Cryptographer's Track at RSA, pp. 425-440, 2001. (Pubitemid 33255180)
-
(2001)
Lecture Notes In Computer Science
, Issue.2020
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
39
-
-
0038148401
-
Hardening functions for large scale distributed computations
-
D. Szajda, B.G. Lawson, and J. Owen, "Hardening Functions for Large Scale Distributed Computations," Proc. IEEE Symp. Security and Privacy, pp. 216-224, 2003.
-
(2003)
Proc IEEE Symp. Security and Privacy
, pp. 216-224
-
-
Szajda, D.1
Lawson, B.G.2
Owen, J.3
-
40
-
-
2442421200
-
Uncheatable grid computing
-
W. Du, J. Jia, M. Mangal, and M. Murugesan, "Uncheatable Grid Computing," Proc. 24th Int'l Conf. Distributed Computing Systems (ICDCS), pp. 4-11, 2004.
-
(2004)
Proc. 24th Int'l Conf. Distributed Computing Systems (ICDCS)
, pp. 4-11
-
-
Du, W.1
Jia, J.2
Mangal, M.3
Murugesan, M.4
|