-
1
-
-
77950347409
-
A view of cloud computing
-
Michael Armbrust, Armando Fox, Rean Griffith, Anthony D Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, and Ion Stoica et al. A view of cloud computing Commun. ACM 53 4 2010 50 58
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
4
-
-
84861191978
-
Sliding mode filter design for nonlinear polynomial systems with unmeasured states
-
Michael Basin, and Pablo Rodriguez-Ramirez Sliding mode filter design for nonlinear polynomial systems with unmeasured states Inform. Sci. 204 2012 82 91
-
(2012)
Inform. Sci.
, vol.204
, pp. 82-91
-
-
Basin, M.1
Rodriguez-Ramirez, P.2
-
7
-
-
84891322736
-
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
-
Fei Chen, Tao Xiang, and Yuanyuan Yang Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud J. Parallel Distrib. Comput. 74 3 2014 2141 2151
-
(2014)
J. Parallel Distrib. Comput.
, vol.74
, Issue.3
, pp. 2141-2151
-
-
Chen, F.1
Xiang, T.2
Yang, Y.3
-
8
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
K.M. Chung, Y. Kalai, S. Vadhan, Improved delegation of computation using fully homomorphic encryption, Advances in Cryptology-CRYPTO 2010, 2010, pp. 483-501.
-
(2010)
Advances in Cryptology-CRYPTO 2010
, pp. 483-501
-
-
Chung, K.M.1
Kalai, Y.2
Vadhan, S.3
-
9
-
-
0000886528
-
Algorithm 235: Random permutation
-
Richard Durstenfeld Algorithm 235: random permutation Commun. ACM 7 7 1964 420 421
-
(1964)
Commun. ACM
, vol.7
, Issue.7
, pp. 420-421
-
-
Durstenfeld, R.1
-
10
-
-
0017677282
-
Probabilistic machines can use less running time
-
Rusins Freivalds Probabilistic machines can use less running time Inform. Process. 77 1977 839 842
-
(1977)
Inform. Process.
, vol.77
, pp. 839-842
-
-
Freivalds, R.1
-
11
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, B. Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers, Advances in Cryptology-CRYPTO 2010, 2010, pp. 465-482.
-
(2010)
Advances in Cryptology-CRYPTO 2010
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
15
-
-
24144493423
-
How to securely outsource cryptographic computations
-
S. Hohenberger, and A. Lysyanskaya How to securely outsource cryptographic computations Theory Cryptogr. 3378 2005 264 282
-
(2005)
Theory Cryptogr.
, vol.3378
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
16
-
-
84865591373
-
Sliding mode control for stochastic systems subject to packet losses
-
Tinggang Jia, Yugang Niu, and Yuanyuan Zou Sliding mode control for stochastic systems subject to packet losses Inform. Sci. 217 2012 117 126
-
(2012)
Inform. Sci.
, vol.217
, pp. 117-126
-
-
Jia, T.1
Niu, Y.2
Zou, Y.3
-
17
-
-
0027617773
-
Fast server-aided secret computation protocols for modular exponentiation
-
S. Kawamura, and A. Shimbo Fast server-aided secret computation protocols for modular exponentiation IEEE J. Select. Areas Commun. 11 5 1993 778 784
-
(1993)
IEEE J. Select. Areas Commun.
, vol.11
, Issue.5
, pp. 778-784
-
-
Kawamura, S.1
Shimbo, A.2
-
19
-
-
84919819478
-
Outsourcing large matrix inversion computation to a public cloud
-
Xinyu Lei, Xiaofeng Liao, Tingwen Huang, Huaqing Li, and Chunqiang Hu Outsourcing large matrix inversion computation to a public cloud IEEE Trans. Cloud Comput. 1 1 2013 78 87
-
(2013)
IEEE Trans. Cloud Comput.
, vol.1
, Issue.1
, pp. 78-87
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Li, H.4
Hu, C.5
-
20
-
-
78049357399
-
Secure multiparty computation for privacy-preserving data mining
-
Yehuda Lindell, and Benny Pinkas Secure multiparty computation for privacy-preserving data mining J. Privacy Confident. 1 1 2009 59 98
-
(2009)
J. Privacy Confident.
, vol.1
, Issue.1
, pp. 59-98
-
-
Lindell, Y.1
Pinkas, B.2
-
21
-
-
84862777930
-
Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments
-
Hongbo Liu, Ajith Abraham, Václav Snášel, and Seán McLoone Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments Inform. Sci. 192 2012 228 243
-
(2012)
Inform. Sci.
, vol.192
, pp. 228-243
-
-
Liu, H.1
Abraham, A.2
Snášel, V.3
McLoone, S.4
-
22
-
-
84889079354
-
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
-
Qin Liu, Guojun Wang, and Jie Wu Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Inform. Sci. 258 2014 355 370
-
(2014)
Inform. Sci.
, vol.258
, pp. 355-370
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
23
-
-
84889103004
-
Architecture and protocol for intercloud communication
-
Jaime Lloret, Miguel Garcia, Jesus Tomas, and Joel JPC Rodrigues Architecture and protocol for intercloud communication Inform. Sci. 258 2014 434 451
-
(2014)
Inform. Sci.
, vol.258
, pp. 434-451
-
-
Lloret, J.1
Garcia, M.2
Tomas, J.3
Rodrigues, J.J.4
-
24
-
-
84889017265
-
Editorial: Cloud computing service and architecture models
-
Gregorio Martinez, Sherali Zeadally, and Han-Chieh Chao Editorial: cloud computing service and architecture models Inform. Sci.: An Int. J. 258 2014 353 354
-
(2014)
Inform. Sci.: An Int. J.
, vol.258
, pp. 353-354
-
-
Martinez, G.1
Zeadally, S.2
Chao, H.-C.3
-
25
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
Springer
-
T. Matsumoto, K. Kato, and H. Imai Speeding up secret computations with insecure auxiliary devices Advances in Cryptology-CRYPTO 88 1990 Springer 497 506
-
(1990)
Advances in Cryptology-CRYPTO 88
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
27
-
-
84855889124
-
Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms
-
Mehdi Mohammadi, Bijan Raahemi, Ahmad Akbari, Babak Nassersharif, and Hossein Moeinzadeh Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms Inform. Sci. 189 2012 219 232
-
(2012)
Inform. Sci.
, vol.189
, pp. 219-232
-
-
Mohammadi, M.1
Raahemi, B.2
Akbari, A.3
Nassersharif, B.4
Moeinzadeh, H.5
-
30
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Commun. ACM 22 11 1979 612 613
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
31
-
-
78649437877
-
Image encryption with multiorders of fractional fourier transforms
-
Ran Tao, Xiang-Yi Meng, and Yue Wang Image encryption with multiorders of fractional fourier transforms IEEE Trans. Inform. Forensics Sec. 5 4 2010 734 738
-
(2010)
IEEE Trans. Inform. Forensics Sec.
, vol.5
, Issue.4
, pp. 734-738
-
-
Tao, R.1
Meng, X.-Y.2
Wang, Y.3
-
32
-
-
84889090038
-
Doccloud: A document recommender system on cloud computing with plausible deniability
-
Juan Vera-del Campo, Josep Pegueroles, Juan Hernández-Serrano, and Miguel Soriano Doccloud: a document recommender system on cloud computing with plausible deniability Inform. Sci. 258 2014 387 402
-
(2014)
Inform. Sci.
, vol.258
, pp. 387-402
-
-
Campo, J.V.-D.1
Pegueroles, J.2
Hernández-Serrano, J.3
Soriano, M.4
-
33
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
IEEE
-
Cong Wang, Kui Ren, and Jia Wang Secure and practical outsourcing of linear programming in cloud computing INFOCOM, 2011 Proceedings 2011 IEEE 820 828
-
(2011)
INFOCOM, 2011 Proceedings
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
34
-
-
84877785052
-
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
-
Cong Wang, Qian Wang, Kui Ren, and Jia Wang Harnessing the cloud for securely outsourcing large-scale systems of linear equations IEEE Trans. Parallel Distrib. Syst. 24 6 2013 1172 1181
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.6
, pp. 1172-1181
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Wang, J.4
-
35
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, and Athanasios V. Vasilakos Security and privacy for storage and computation in cloud computing Inform. Sci. 258 2014 371 386
-
(2014)
Inform. Sci.
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
36
-
-
84875453568
-
K-local hyperplane distance nearest neighbor classifier oriented local discriminant analysis
-
Jie Xu, Jian Yang, and Zhihui Lai K-local hyperplane distance nearest neighbor classifier oriented local discriminant analysis Inform. Sci. 232 2013 11 26
-
(2013)
Inform. Sci.
, vol.232
, pp. 11-26
-
-
Xu, J.1
Yang, J.2
Lai, Z.3
-
38
-
-
79251594543
-
A chaos-based symmetric image encryption scheme using a bit-level permutation
-
Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong, and Hai Yu A chaos-based symmetric image encryption scheme using a bit-level permutation Inform. Sci. 181 6 2011 1171 1186
-
(2011)
Inform. Sci.
, vol.181
, Issue.6
, pp. 1171-1186
-
-
Zhu, Z.-L.1
Zhang, W.2
Wong, K.-W.3
Yu, H.4
|