-
1
-
-
71749113079
-
Identity-based authentication for cloud computing
-
H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing, " in Cloud computing. Springer, 2009, pp. 157-166.
-
(2009)
Cloud Computing. Springer
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
2
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Toward secure and dependable storage services in cloud computing, " IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220-232, 2012.
-
(2012)
IEEE Transactions on Services Computing
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
3
-
-
84910661762
-
Efficiently verifiable computation on encrypted data
-
D. Fiore, R. Gennaro, and V. Pastro, "Efficiently verifiable computation on encrypted data, " in ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014, pp. 844-855.
-
(2014)
ACM SIGSAC Conference on Computer and Communications Security. ACM
, pp. 844-855
-
-
Fiore, D.1
Gennaro, R.2
Pastro, V.3
-
4
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
Springer
-
B. Parno, M. Raykova, and V. Vaikuntanathan, "How to delegate and verify in public: Verifiable computation from attribute-based encryption, " in Theory of Cryptography. Springer, 2012, pp. 422-439.
-
(2012)
Theory of Cryptography.
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
5
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Springer
-
R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers, " in Advances in Cryptology-CRYPTO. Springer, 2010, pp. 465-482.
-
(2010)
Advances in Cryptology-CRYPTO
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
6
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
M. Backes, D. Fiore, and R. M. Reischuk, "Verifiable delegation of computation on outsourced data, " in ACM SIGSAC conference on Computer & communications security. ACM, 2013, pp. 863-874.
-
(2013)
ACM SIGSAC Conference on Computer & Communications Security. ACM
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
7
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
D. Fiore and R. Gennaro, "Publicly verifiable delegation of large polynomials and matrix computations, with applications, " in ACM conference on Computer and communications security. ACM, 2012, pp. 501-512.
-
(2012)
ACM Conference on Computer and Communications Security. ACM
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
8
-
-
84893690959
-
Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps
-
Springer
-
L. F. Zhang and R. Safavi-Naini, "Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps, " in Cryptology and Network Security. Springer, 2013, pp. 329-348.
-
(2013)
Cryptology and Network Security
, pp. 329-348
-
-
Zhang, L.F.1
Safavi-Naini, R.2
-
9
-
-
84973579525
-
Enabling finegrained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
-
H. Li, Y. Yang, T. Luan, X. Liang, L. Zhou, and X. Shen, "Enabling finegrained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data, " IEEE Transactions on Dependable and Secure Computing, 2015, DOI: 10. 1109/TDSC. 2015. 2406704.
-
(2015)
IEEE Transactions on Dependable and Secure Computing
-
-
Li, H.1
Yang, Y.2
Luan, T.3
Liang, X.4
Zhou, L.5
Shen, X.6
-
10
-
-
84964824802
-
-
M. I. MIRACL and C. Rational Arithmetic
-
M. I. MIRACL and C. Rational Arithmetic, "C++ library. "
-
C++ Library.
-
-
-
11
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
Springer
-
K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption, " in Advances in Cryptology-CRYPTO. Springer, 2010, pp. 483-501.
-
(2010)
Advances in Cryptology-CRYPTO
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
12
-
-
84881259359
-
Pinocchio: Nearly practical verifiable computation
-
B. Parno, J. Howell, C. Gentry, and M. Raykova, "Pinocchio: Nearly practical verifiable computation, " in IEEE Symposium on Security and Privacy. IEEE, 2013, pp. 238-252.
-
(2013)
IEEE Symposium on Security and Privacy. IEEE
, pp. 238-252
-
-
Parno, B.1
Howell, J.2
Gentry, C.3
Raykova, M.4
-
13
-
-
84921350434
-
Efficient secure and verifiable outsourcing of matrix multiplications
-
Springer
-
Y. Zhang and M. Blanton, "Efficient secure and verifiable outsourcing of matrix multiplications, " in Information Security. Springer, 2014, pp. 158-178.
-
(2014)
Information Security
, pp. 158-178
-
-
Zhang, Y.1
Blanton, M.2
-
14
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Springer
-
S. Benabbas, R. Gennaro, and Y. Vahlis, "Verifiable delegation of computation over large datasets, " in Advances in Cryptology-CRYPTO. Springer, 2011, pp. 111-131.
-
(2011)
Advances in Cryptology-CRYPTO.
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
|