-
1
-
-
67650080189
-
Private and cheating-free outsourcing of algebraic computations
-
D. Benjamin and M. J. Atallah, Private and Cheating-free Outsourcing of Algebraic Computations, in Proc. of 6th Conf. on Privacy, Security, and Trust (PST), 2008, pp. 240-45.
-
(2008)
Proc. of 6th Conf. on Privacy, Security, and Trust (PST)
, pp. 240-245
-
-
Benjamin, D.1
Atallah, M.J.2
-
3
-
-
77956778645
-
Secure outsourcing of scientific computations
-
M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, Secure Outsourcing of Scientific Computations, Advances in Computers, vol.54, pp. 216-272, 2001.
-
(2001)
Advances in Computers
, vol.54
, pp. 216-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.H.4
-
5
-
-
0036867930
-
Preconditioning techniques for large linear systems: A survey
-
M. Benzi, Preconditioning Techniques for Large Linear Systems: A Survey, Journal of Computational Physics, 182, pp. 418-477, 2002.
-
(2002)
Journal of Computational Physics
, vol.182
, pp. 418-477
-
-
Benzi, M.1
-
7
-
-
0004116989
-
-
2nd ed. MIT press
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. MIT press, 2008.
-
(2008)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
9
-
-
84958524125
-
Generalizing homomorphic macs for arithmetic circuits
-
D. Catalano, D. Fiore, R. Gennaro, and L. Nizzardo, Generalizing Homomorphic MACs for Arithmetic Circuits, In Buenos Aires, Argentina, PKC 2014, Proceedings: LNCS 8383, pp. 538-555, 2014.
-
(2014)
Buenos Aires, Argentina, PKC 2014, Proceedings: LNCS 8383
, pp. 538-555
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Nizzardo, L.4
-
10
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
Springer-Verlag
-
X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, New Algorithms for Secure Outsourcing of Modular Exponentiations, ESORICS 2012, LNCS 7459, pp. 541-556, Springer-Verlag, 2012.
-
(2012)
ESORICS 2012, LNCS 7459
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
11
-
-
84923145901
-
-
Manuskipt, submitted to IEEE Transactions on Information Forensics and Security
-
X. Chen, J. Li, J. Ma, W. Lou, and D. S. Wong, New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations, Manuskipt, submitted to IEEE Transactions on Information Forensics and Security.
-
New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations
-
-
Chen, X.1
Li, J.2
Ma, J.3
Lou, W.4
Wong, D.S.5
-
12
-
-
0029490594
-
Solution of dense systems of linear equations arising from integral-equation formulations
-
K. Forsman, W. Gropp, L. Kettunen, D. Levine, and J. Salonen, Solution of Dense Systems of Linear Equations Arising from Integral-equation Formulations, IEEE Antennas and Propagation Magazine, 37(6), pp. 96-100, 1995.
-
(1995)
IEEE Antennas and Propagation Magazine
, vol.37
, Issue.6
, pp. 96-100
-
-
Forsman, K.1
Gropp, W.2
Kettunen, L.3
Levine, D.4
Salonen, J.5
-
13
-
-
84892393413
-
Fully homomorphic message authenticators
-
Springer, Heidelberg
-
R. Gennaro and D. Wichs, Fully Homomorphic Message Authenticators, Proc. of ASIACRYPT 2013, LNCS 8270, pp. 301-320. Springer, Heidelberg (2013).
-
(2013)
Proc. of ASIACRYPT 2013, LNCS 8270
, pp. 301-320
-
-
Gennaro, R.1
Wichs, D.2
-
14
-
-
33646773954
-
-
Springer-Verlag
-
M. Girault and D. Lefranc, Server-aided Verification: Theory and Practice, Advances in Cryptology-ASIACRYPT 2005, LNCS 3788, Springer-Verlag, pp. 605-623, 2005.
-
(2005)
Server-aided Verification: Theory and Practice, Advances in Cryptology-ASIACRYPT 2005, LNCS 3788
, pp. 605-623
-
-
Girault, M.1
Lefranc, D.2
-
15
-
-
84937432284
-
Secure server-aided signature generation
-
M. Jakobsson and S. Wetzel, Secure Server-aided Signature Generation. PKC 2001, LNCS 1992, pp.383-401. 2001.
-
(2001)
PKC 2001, LNCS 1992
, pp. 383-401
-
-
Jakobsson, M.1
Wetzel, S.2
-
17
-
-
77954051808
-
-
US Natl Inst. of Science and Technology
-
P. Mell and T. Grance, The NIST Definition of Cloud Computing, US Natl Inst. of Science and Technology, 2011; http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
-
(2011)
The NIST Definition of Cloud Computing
-
-
Mell, P.1
Grance, T.2
-
18
-
-
84903852537
-
Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming
-
H. Nie, X. Chen, J. Li, J. Liu, and W. Lou, Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming. Proceedings of the IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 591-596, 2014.
-
(2014)
Proceedings of the IEEE 28th International Conference on Advanced Information Networking and Applications (AINA)
, pp. 591-596
-
-
Nie, H.1
Chen, X.2
Li, J.3
Liu, J.4
Lou, W.5
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, Public-key Cryptosystems based on Composite Degree Residuosity Classes. Proc. of EUROCRYPT, 1999, pp. 223-238.
-
(1999)
Proc. of EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
84862907810
-
Security challenges for the public cloud
-
Jan.-Feb.
-
K. Ren, C. Wang, and Q. Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, v 16, n 1, pp. 69-73, Jan.-Feb. 2012.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
21
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
C. Wang, K. Ren, and J. Wang, Secure and Practical Outsourcing of Linear Programming in Cloud Computing, Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM), pp. 820-828, 2011.
-
(2011)
Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM)
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
22
-
-
84877785052
-
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
-
C. Wang, K. Ren, J. Wang, and Qian Wang, Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations, IEEE Trans. Parallel Distribution Systems, 24(6), pp. 1172-1181, 2013.
-
(2013)
IEEE Trans. Parallel Distribution Systems
, vol.24
, Issue.6
, pp. 1172-1181
-
-
Wang, C.1
Ren, K.2
Wang, J.3
Wang, Q.4
-
23
-
-
84865465739
-
Dynamic credentials and ciphertext delegation for attribute-based encryption
-
A. Sahai, H. Seyalioglu, and B. Waters, Dynamic Credentials and Ciphertext Delegation for Attribute-based Encryption. CRYPTO 2012, LNCS 7417, pp. 199-217, 2012.
-
(2012)
CRYPTO 2012, LNCS 7417
, pp. 199-217
-
-
Sahai, A.1
Seyalioglu, H.2
Waters, B.3
|