-
1
-
-
34250257862
-
Auxiliary problem principle and decomposition optimization problems
-
G. Cohen, Auxiliary problem principle and decomposition optimization problems, Journal of Optimizatin Theory and Appilications, 32(3), pp. 277-305, 1980.
-
(1980)
Journal of Optimizatin Theory and Appilications
, vol.32
, Issue.3
, pp. 277-305
-
-
Cohen, G.1
-
2
-
-
77956778645
-
Secure outsourcing of scientific computations
-
MJ. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, Secure outsourcing of scientific computations, Advances in Computers, Vol. 54, pp. 216-272, 2001.
-
(2001)
Advances in Computers
, vol.54
, pp. 216-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.H.4
-
3
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
M. Atallah and K. Frikken, Securely outsourcing linear algebra computations Proc. of ASIACCS, pp. 48-59, 2010.
-
(2010)
Proc. of ASIACCS
, pp. 48-59
-
-
Atallah, M.1
Frikken, K.2
-
4
-
-
67650080189
-
Private and cheating-free outsourcing of algebraic computations
-
D. Benjamin and M. J. Atallah, Private and cheating-free outsourcing of algebraic computations, Proc. of 6th Conf. on Privacy, Security, and Trust (PST), pp. 240-245, 2008.
-
(2008)
Proc. of 6th Conf. on Privacy, Security, and Trust (PST)
, pp. 240-245
-
-
Benjamin, D.1
Atallah, M.J.2
-
5
-
-
0023545074
-
On hiding information from an oracle
-
M. Abadi, J. Feigenbaum, and J. Kilian, On hiding information from an oracle, Proc. of the 19th Annual ACM Symposium on Theory of Computing (STOC), pp. 195-203, 1987.
-
(1987)
Proc. of the 19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 195-203
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
6
-
-
45749113016
-
Improved conditional e-payments
-
LNCS 5037, Springer-Verlag
-
M. Blanton, Improved conditional e-payments, ACNS 2008, LNCS 5037, Springer-Verlag, pp. 188-206, 2008.
-
(2008)
ACNS 2008
, pp. 188-206
-
-
Blanton, M.1
-
7
-
-
0001870201
-
Locally random reductions: Improvements and applications
-
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, Locally random reductions: Improvements and applications, Journal of Cryptology, 10(1), pp. 17-36, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.1
, pp. 17-36
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
8
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
LNCS 6841, Springer-Verlag
-
S. Benabbas, R. Gennaro, and Y. Vahlis, Verifiable delegation of computation over large datasets, Advances in Cryptology-Crypto 2011, LNCS 6841, Springer-Verlag, pp. 111-131, 2011.
-
(2011)
Advances in Cryptology-Crypto 2011
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
9
-
-
84870282993
-
Efficient fair conditional payments for outsourcing computations
-
X. Chen, J. Li, and W. Susilo, Efficient Fair Conditional Payments for Outsourcing Computations, IEEE Transactions on Information Forensics and Security, 7(6), pp. 1687-1694, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.6
, pp. 1687-1694
-
-
Chen, X.1
Li, J.2
Susilo, W.3
-
10
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
LNCS 7459 Springer-Verlag
-
X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, New algorithms for secure outsourcing of modular exponentiations, ESORICS 2012, LNCS 7459, pp. 541-556, Springer-Verlag, 2012.
-
(2012)
ESORICS 2012
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
11
-
-
85001025766
-
Wallet databases with observers
-
LNCS 740, Springer-Verlag
-
D. Chaum and T. Pedersen, Wallet databases with observers, Advances in Cryptology-Crypto 1992, LNCS 740, Springer-Verlag, pp. 89-105, 1993.
-
(1993)
Advances in Cryptology-Crypto 1992
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
-
12
-
-
80755169473
-
Practical delegation of computation using multiple servers
-
R. Canetti, B. Riva, G. Rothblum, Practical delegation of computation using multiple servers, Proc. of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 445-454, 2011.
-
(2011)
Proc. of the 18th ACM Conference on Computer and Communications Security (CCS)
, pp. 445-454
-
-
Canetti, R.1
Riva, B.2
Rothblum, G.3
-
14
-
-
84856186159
-
Practical secure and efficient multiparty linear programming based on problem transformation
-
ePrint Archive 2011/108
-
J. Dreier and F. Kerschbaum, Practical secure and efficient multiparty linear programming based on problem transformation. IACR Cryptology ePrint Archive 2011/108, 2011.
-
(2011)
IACR Cryptology
-
-
Dreier, J.1
Kerschbaum, F.2
-
15
-
-
33646773954
-
Server-aided verification: Theory and practice
-
LNCS 3788, Springer-Verlag
-
M. Girault and D. Lefranc, Server-aided verification: theory and practice, Advances in Cryptology-ASIACRYPT 2005, LNCS 3788, Springer-Verlag, pp. 605-623, 2005.
-
(2005)
Advances in Cryptology-ASIACRYPT 2005
, pp. 605-623
-
-
Girault, M.1
Lefranc, D.2
-
16
-
-
84937555419
-
Uncheatable distributed computations
-
LNCS 2020, Springer-Verlag
-
P. Golle, I. Mironov, Uncheatable distributed computations, CT-RSA 2001, LNCS 2020, Springer-Verlag, pp. 425-440, 2001
-
(2001)
CT-RSA 2001
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
17
-
-
0023545076
-
How to play any mental game
-
O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game, Proc. of the 19th Symp. on the Theory of Comp., pp. 218-229, 1987.
-
(1987)
Proc. of the 19th Symp. on the Theory of Comp.
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
LNCS 6223, Springer-Verlag
-
R. Gennaro, C. Gentry, and B. Parno, Non-interactive verifiable computing: Outsourcing computation to untrusted workers, Advances in Cryptology-Crypto 2010, LNCS 6223, Springer-Verlag, pp. 465-482, 2010.
-
(2010)
Advances in Cryptology-Crypto 2010
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
19
-
-
24144493423
-
How to securely outsource cryptographic computations
-
LNCS 3378, Springer Verlag
-
S. Hohenberger and A. Lysyanskaya, How to securely outsource cryptographic computations, TCC 2005, LNCS 3378, Springer Verlag, pp. 264-282, 2005.
-
(2005)
TCC 2005
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
20
-
-
0004116989
-
-
2nd ed., MIT press
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed., MIT press, 2008.
-
(2008)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
24
-
-
33847420463
-
Conditional value at risk and related linear programming models for portfolio optimization
-
Springer
-
R. Mansini, W. Ogryczak, M.G. Speranza, Conditional value at risk and related linear programming models for portfolio optimization, Annals of Operations Research, 152(1), Springer, pp. 227-256, 2007.
-
(2007)
Annals of Operations Research
, vol.152
, Issue.1
, pp. 227-256
-
-
Mansini, R.1
Ogryczak, W.2
Speranza, M.G.3
-
25
-
-
24144458382
-
Distribution of modular sums and the security of server aided exponentiation
-
PQ. Nguyen, I.E. Shparlinski, and J. Stern, Distribution of modular sums and the security of server aided exponentiation, Proc. of the Workshop on Comp. Number Theory and Crypt., pp. 1-16, 1999.
-
(1999)
Proc. of the Workshop on Comp. Number Theory and Crypt.
, pp. 1-16
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
Stern, J.3
-
26
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
LNCS 7194, Springer-Verlag
-
B. Parno, M. Raykova and V Vaikuntanathan, How to delegate and verify in public: verifiable computation from attribute-based encryption, TCC 2012, LNCS 7194, Springer-Verlag, pp. 422-439, 2012.
-
(2012)
TCC 2012
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
27
-
-
12344258539
-
Efficient signature generation for smart cards
-
Springer-Verlag
-
C. P. Schnorr, Efficient signature generation for smart cards, Journal of Cryptology, 4(3), pp. 239-252, Springer-Verlag, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
28
-
-
38549097531
-
Conditional E-cash
-
LNCS 4886, Springer-Verlag
-
L. Shi, B. Carbunar, and R. Sion, Conditional E-cash, FC 2007, LNCS 4886, Springer-Verlag, pp. 15-28, 2007.
-
(2007)
FC 2007
, pp. 15-28
-
-
Shi, L.1
Carbunar, B.2
Sion, R.3
-
29
-
-
84877785052
-
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
-
C. Wang, K. Ren, J. Wang, and Qian Wang, Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations, IEEE Trans. Parallel Distribution Systems, 24(6), pp. 1172-1181, 2013.
-
(2013)
IEEE Trans. Parallel Distribution Systems
, vol.24
, Issue.6
, pp. 1172-1181
-
-
Wang, C.1
Ren, K.2
Wang, J.3
Wang, Q.4
-
31
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
C. Wang, K. Ren, and J. Wang, Secure and practical outsourcing of linear programming in cloud computing, Proc. of the 30th IEEE International Conference on Computer Communications (INFOCOM), pp. 820-828, 2011.
-
(2011)
Proc. of the 30th IEEE International Conference on Computer Communications (INFOCOM)
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
|