-
1
-
-
71749113079
-
Identity-based authentication for cloud computing
-
Springer
-
H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing," in Cloud computing. Springer, 2009, pp. 157-166.
-
(2009)
Cloud Computing
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
2
-
-
77954749319
-
Token-based cloud computing
-
Springer
-
A.-R. Sadeghi, T. Schneider, and M. Winandy, "Token-based cloud computing," in Trust and Trustworthy Computing. Springer, 2010, pp. 417-429.
-
(2010)
Trust and Trustworthy Computing
, pp. 417-429
-
-
Sadeghi, A.-R.1
Schneider, T.2
Winandy, M.3
-
3
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
M. Backes, D. Fiore, and R. M. Reischuk, "Verifiable delegation of computation on outsourced data," in Proceedings of the ACM SIGSAC conference on Computer & communications security. ACM, 2013, pp. 863-874.
-
(2013)
Proceedings of the ACM SIGSAC Conference on Computer & Communications Security. ACM
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
4
-
-
84963735988
-
Design of computer vision and image processing technology based car keys tooth identification detection system
-
H. Y. Li, "Design of computer vision and image processing technology based car keys tooth identification detection system," in Advanced Materials Research, vol. 1079, 2015, pp. 1061-1063.
-
(2015)
Advanced Materials Research
, vol.1079
, pp. 1061-1063
-
-
Li, H.Y.1
-
5
-
-
84925587906
-
Nnb: An efficient nearest neighbor search method for hierarchical clustering on large datasets
-
W. Zhang, G. Zhang, Y. Wang, Z. Zhu, and T. Li, "Nnb: An efficient nearest neighbor search method for hierarchical clustering on large datasets," in IEEE International Conference on Semantic Computing (ICSC). IEEE, 2015, pp. 405-412.
-
(2015)
IEEE International Conference on Semantic Computing (ICSC). IEEE
, pp. 405-412
-
-
Zhang, W.1
Zhang, G.2
Wang, Y.3
Zhu, Z.4
Li, T.5
-
6
-
-
84973579525
-
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
-
H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. S. Shen, "Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data," IEEE Transactions on Dependable and Secure Computing, 2015, DOI: 10.1109/TDSC.2015.2406704.
-
(2015)
IEEE Transactions on Dependable and Secure Computing
-
-
Li, H.1
Yang, Y.2
Luan, T.H.3
Liang, X.4
Zhou, L.5
Shen, X.S.6
-
7
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Springer
-
R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in Advances in Cryptology-CRYPTO 2010. Springer, 2010, pp. 465-482.
-
(2010)
Advances in Cryptology-CRYPTO 2010
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
8
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
D. Fiore and R. Gennaro, "Publicly verifiable delegation of large polynomials and matrix computations, with applications," in ACM conference on Computer and communications security. ACM, 2012, pp. 501-512.
-
(2012)
ACM Conference on Computer and Communications Security. ACM
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
10
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Springer
-
S. Benabbas, R. Gennaro, and Y. Vahlis, "Verifiable delegation of computation over large datasets," in Advances in Cryptology-CRYPTO. Springer, 2011, pp. 111-131.
-
(2011)
Advances in Cryptology-CRYPTO
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
11
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
Springer
-
K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption," in Advances in Cryptology-CRYPTO. Springer, 2010, pp. 483-501.
-
(2010)
Advances in Cryptology-CRYPTO
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
12
-
-
84881259359
-
Pinocchio: Nearly practical verifiable computation
-
B. Parno, J. Howell, C. Gentry, and M. Raykova, "Pinocchio: Nearly practical verifiable computation," in IEEE Symposium on Security and Privacy. IEEE, 2013, pp. 238-252.
-
(2013)
IEEE Symposium on Security and Privacy. IEEE
, pp. 238-252
-
-
Parno, B.1
Howell, J.2
Gentry, C.3
Raykova, M.4
-
13
-
-
84910661762
-
Efficiently verifiable computation on encrypted data
-
D. Fiore, R. Gennaro, and V. Pastro, "Efficiently verifiable computation on encrypted data," in ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014, pp. 844-855.
-
(2014)
ACM SIGSAC Conference on Computer and Communications Security. ACM
, pp. 844-855
-
-
Fiore, D.1
Gennaro, R.2
Pastro, V.3
-
14
-
-
84893690959
-
Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps
-
Springer
-
L. F. Zhang and R. Safavi-Naini, "Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps," in Cryptology and Network Security. Springer, 2013, pp. 329-348.
-
(2013)
Cryptology and Network Security
, pp. 329-348
-
-
Zhang, L.F.1
Safavi-Naini, R.2
-
16
-
-
84921350434
-
Efficient secure and verifiable outsourcing of matrix multiplications
-
Springer
-
Y. Zhang and M. Blanton, "Efficient secure and verifiable outsourcing of matrix multiplications," in Information Security. Springer, 2014, pp. 158-178.
-
(2014)
Information Security
, pp. 158-178
-
-
Zhang, Y.1
Blanton, M.2
-
17
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
Springer
-
B. Parno, M. Raykova, and V. Vaikuntanathan, "How to delegate and verify in public: Verifiable computation from attribute-based encryption," in Theory of Cryptography. Springer, 2012, pp. 422-439.
-
(2012)
Theory of Cryptography
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
|