메뉴 건너뛰기




Volumn 34, Issue 6, 2013, Pages 786-791

Secure scalar product computation of vectors in cloud computing

Author keywords

Cloud computing; Correctness verification; Privacy preservation; Scalar product of vectors

Indexed keywords

ALGEBRAIC PROPERTIES; COMPUTATION PROTOCOLS; COMPUTING RESEARCH; CORRECTNESS VERIFICATIONS; PRIVACY PRESERVATION; PRIVACY PRESERVING; SCALAR PRODUCT; SECURE SCALAR PRODUCT;

EID: 84879706154     PISSN: 10053026     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (14)
  • 1
    • 79951999348 scopus 로고    scopus 로고
    • Study on cloud computing security
    • Feng Deng-guo, Zhang Min, Zhang Yan, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1): 71-83.
    • (2011) Journal of Software , vol.22 , Issue.1 , pp. 71-83
    • Feng, D.-G.1    Zhang, M.2    Zhang, Y.3
  • 2
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • Edmonton
    • Vaidya J, Clifton C. Privacy preserving association rule mining in vertically partitioned data[C]//Proceedings of the eighth ACM SIGKDD. Edmonton, 2002: 639-644.
    • (2002) Proceedings of the eighth ACM SIGKDD , pp. 639-644
    • Vaidya, J.1    Clifton, C.2
  • 4
    • 33744743349 scopus 로고    scopus 로고
    • Privacy protection in the relative position determination for two spatial geometric objects
    • Luo Yong-long, Huang Liu-sheng, Jing Wei-wei, et al. Privacy protection in the relative position determination for two spatial geometric objects[J]. Journal of Computer Research and Development, 2006, 43(3): 410-416.
    • (2006) Journal of Computer Research and Development , vol.43 , Issue.3 , pp. 410-416
    • Luo, Y.-L.1    Huang, L.-S.2    Jing, W.-W.3
  • 5
    • 77955176662 scopus 로고    scopus 로고
    • Efficient privacy-preserving similar document detection
    • Murugesan M, Jiang W, Clifton C, et al. Efficient privacy-preserving similar document detection[J]. The VLDB Journal, 2010, 19(4): 457-475.
    • (2010) The VLDB Journal , vol.19 , Issue.4 , pp. 457-475
    • Murugesan, M.1    Jiang, W.2    Clifton, C.3
  • 8
    • 77950572596 scopus 로고    scopus 로고
    • Server transparent query authentication of outsourced database
    • Zhang Min, Hong Cheng, Chen Chi. Server transparent query authentication of outsourced database[J]. Journal of Computer Research and Development, 2010, 47(1): 182-190.
    • (2010) Journal of Computer Research and Development , vol.47 , Issue.1 , pp. 182-190
    • Zhang, M.1    Hong, C.2    Chen, C.3
  • 9
    • 84997556980 scopus 로고    scopus 로고
    • Integrity auditing of outsourced data
    • Vienna
    • Xie M, Wang H, Yin J, et al. Integrity auditing of outsourced data[C]//Proceedings of the 33rd VLDB.Vienna, 2007: 782-793.
    • (2007) Proceedings of the 33rd VLDB , pp. 782-793
    • Xie, M.1    Wang, H.2    Yin, J.3
  • 11
    • 67649510426 scopus 로고    scopus 로고
    • Authenticated indexing for outsourced spatial databases
    • Yang Y, Papadopoulos S, Papadias D, et al. Authenticated indexing for outsourced spatial databases[J]. The VLDB Journal, 2009, 18(3): 631-648.
    • (2009) The VLDB Journal , vol.18 , Issue.3 , pp. 631-648
    • Yang, Y.1    Papadopoulos, S.2    Papadias, D.3
  • 12
    • 77954281765 scopus 로고    scopus 로고
    • An integrity checking scheme in outsourced database model
    • Xian He-qun, Feng Deng-guo. An integrity checking scheme in outsourced database model[J]. Journal of Computer Research and Development, 2010, 47(6): 1107-1115.
    • (2010) Journal of Computer Research and Development , vol.47 , Issue.6 , pp. 1107-1115
    • Xian, H.-Q.1    Feng, D.-G.2
  • 13
    • 80051555582 scopus 로고    scopus 로고
    • Data outsourcing authentication model based on authenticated data structures for cloud computing
    • Xu Jian, Zhou Fu-cai, Chen Xu, et al. Data outsourcing authentication model based on authenticated data structures for cloud computing[J]. Journal on Communications, 2011, 32(7): 153-160.
    • (2011) Journal on Communications , vol.32 , Issue.7 , pp. 153-160
    • Xu, J.1    Zhou, F.-C.2    Chen, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.