-
1
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
ACM, New York
-
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: 19th ACM Conference on Computer and Communications Security, pp. 501–512. ACM, New York (2012)
-
(2012)
19Th ACM Conference on Computer and Communications Security
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
2
-
-
84963766973
-
Enabling efficient publicly verifiable outsourcing computation for matrix multiplication
-
IEEE Press, New York
-
Li, H., Zhang, S., Luan, T.H., Ren, H., Dai, Y., Zhou, L.: Enabling efficient publicly verifiable outsourcing computation for matrix multiplication. In: International Telecommunication Networks and Applications Conference (ITNAC), pp. 44–50. IEEE Press, New York (2015)
-
(2015)
International Telecommunication Networks and Applications Conference (ITNAC)
, pp. 44-50
-
-
Li, H.1
Zhang, S.2
Luan, T.H.3
Ren, H.4
Dai, Y.5
Zhou, L.6
-
3
-
-
84964853019
-
Enabling efficient and secure outsourcing of large matrix multiplications
-
IEEE Press, New York
-
Jia, K., Li, H., Liu, D., Yu, S.: Enabling efficient and secure outsourcing of large matrix multiplications. In: IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE Press, New York (2015)
-
(2015)
IEEE Global Communications Conference (GLOBECOM)
, pp. 1-6
-
-
Jia, K.1
Li, H.2
Liu, D.3
Yu, S.4
-
4
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Rabin, T. (ed.), Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7-25
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
5
-
-
84934276953
-
Verifiable and secure outsourcing of matrix calculation and its application
-
Hu, X., Pei, D., Tang, C., Wong, D.: Verifiable and secure outsourcing of matrix calculation and its application. Scientia inica (Informationis) 43(7), 842–852 (2013)
-
(2013)
Scientia Inica (Informationis)
, vol.43
, Issue.7
, pp. 842-852
-
-
Hu, X.1
Pei, D.2
Tang, C.3
Wong, D.4
-
6
-
-
84916890442
-
New algorithms for secure outsourcing of large-scale systems of linear equations
-
Chen, X., Huang, X., Li, J., Ma, J., Lou, W., Wong, D.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2015)
-
(2015)
IEEE Trans. Inf. Forensics Secur
, vol.10
, Issue.1
, pp. 69-78
-
-
Chen, X.1
Huang, X.2
Li, J.3
Ma, J.4
Lou, W.5
Wong, D.6
-
8
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
ACM Press, New York
-
Atallah, M., Frikken, K.: Securely outsourcing linear algebra computations. In: 5th ACM Symposium on Information, Computer and Communications Security, pp. 48–59. ACM Press, New York (2010)
-
(2010)
5Th ACM Symposium on Information, Computer and Communications Security
, pp. 48-59
-
-
Atallah, M.1
Frikken, K.2
-
9
-
-
67650080189
-
Private and cheating-free outsourcing of algebraic computations
-
IEEE Press, New York
-
Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Sixth Annual Conference on Privacy, Security and Trust (PST 2008), pp. 240–245. IEEE Press, New York (2008)
-
(2008)
Sixth Annual Conference on Privacy, Security and Trust (PST 2008)
, pp. 240-245
-
-
Benjamin, D.1
Atallah, M.J.2
-
11
-
-
84919819478
-
Outsourcing large matrix inversion computation to a public cloud
-
Lei, X., Liao, X., Huang, T., Li, H., Hu, C.: Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1(1), 1 (2013). http://eeexplore.ieee.org/xpls/absall.jsp?arnumber=6613485&tag=1
-
(2013)
IEEE Trans. Cloud Comput
, vol.1
, Issue.1
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Li, H.4
Hu, C.5
-
12
-
-
84902436467
-
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
-
Lei, X., Liao, X., Huang, T., Heriniaina, F.: Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 205–217 (2014)
-
(2014)
Inf. Sci
, vol.280
, pp. 205-217
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Heriniaina, F.4
-
13
-
-
84944078971
-
Cloud computing service: The case of large matrix determinant computation
-
Lei, X., Liao, X., Huang, T., Li, H.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8(5), 688–700 (2015)
-
(2015)
IEEE Trans. Serv. Comput
, vol.8
, Issue.5
, pp. 688-700
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Li, H.4
-
14
-
-
84877785052
-
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
-
Wang, C., Ren, K., Wang, J., Wang, Q.: Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Trans. Parallel Distrib. Syst. 24(6), 1172–1181 (2013)
-
(2013)
IEEE Trans. Parallel Distrib. Syst
, vol.24
, Issue.6
, pp. 1172-1181
-
-
Wang, C.1
Ren, K.2
Wang, J.3
Wang, Q.4
-
15
-
-
84891322736
-
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
-
Chen, F., Xiang, T., Yang, Y.: Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74(3), 2141–2151 (2014)
-
(2014)
J. Parallel Distrib. Comput
, vol.74
, Issue.3
, pp. 2141-2151
-
-
Chen, F.1
Xiang, T.2
Yang, Y.3
-
16
-
-
84946691392
-
Verifiable algorithm for secure outsourcing of systems of linear equations in the case of no solution
-
IEEE Press, New York
-
Nie, H., Ma, H., Wang, J., Chen, X.: Verifiable algorithm for secure outsourcing of systems of linear equations in the case of no solution. In: Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 572–577. IEEE Press, New York (2014)
-
(2014)
Ninth International Conference on Broadband and Wireless Computing, Communication and Applications
, pp. 572-577
-
-
Nie, H.1
Ma, H.2
Wang, J.3
Chen, X.4
-
17
-
-
84954231523
-
Efficient secure outsourcing of large-scale linear systems of equations
-
IEEE Press, New York
-
Salinas, S., Luo, C., Chen, X., Li, P.: Efficient secure outsourcing of large-scale linear systems of equations. In: IEEE INFOCOM 2015, pp. 1035–1043. IEEE Press, New York (2015)
-
(2015)
IEEE INFOCOM 2015
, pp. 1035-1043
-
-
Salinas, S.1
Luo, C.2
Chen, X.3
Li, P.4
-
18
-
-
77955176662
-
Efficient privacypreserving similar document detection
-
Murugesan, M., Jiang, W., Clifton, C., Si, L., Vaidya, J.: Efficient privacypreserving similar document detection. VLDB J. 19(4), 457–475 (2010)
-
(2010)
VLDB J
, vol.19
, Issue.4
, pp. 457-475
-
-
Murugesan, M.1
Jiang, W.2
Clifton, C.3
Si, L.4
Vaidya, J.5
-
19
-
-
84879706154
-
Secure scalar product computation of vectors in cloud computing
-
Sheng, G., Wen, T., Guo, Q., Yin, Y.: Secure scalar product computation of vectors in cloud computing. J. Northeast. Univ. 34(6), 786–791 (2013)
-
(2013)
J. Northeast. Univ
, vol.34
, Issue.6
, pp. 786-791
-
-
Sheng, G.1
Wen, T.2
Guo, Q.3
Yin, Y.4
-
20
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
ACM, New York
-
Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 863–874. ACM, New York (2013)
-
(2013)
2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
21
-
-
79960862322
-
Secure practical outsourcing of linear programming in cloud computing
-
IEEE Press, New York
-
Wang, C., Ren, K., Wang, J.: Secure practical outsourcing of linear programming in cloud computing. In: IEEE INFOCOM 2011, pp. 820–828. IEEE Press, New York (2011)
-
(2011)
IEEE INFOCOM 2011
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
22
-
-
84936803501
-
Privacy-preserving face recognition with outsourced computation
-
Xiang, C., Tang, C., Cai, Y., Xu, Q.: Privacy-preserving face recognition with outsourced computation. Soft Comput. 20(9), 3735–3744 (2016)
-
(2016)
Soft Comput
, vol.20
, Issue.9
, pp. 3735-3744
-
-
Xiang, C.1
Tang, C.2
Cai, Y.3
Xu, Q.4
-
23
-
-
84940824696
-
Efficient secure similarity computation on encrypted trajectory data
-
IEEE Press, New York
-
Liu, A., Zhengy, K., Liz, L., Liu, G., Zhao, L., Zhou, X.: Efficient secure similarity computation on encrypted trajectory data. In: IEEE 31st International Conference on Data Engineering, pp. 66–77. IEEE Press, New York (2015)
-
(2015)
IEEE 31St International Conference on Data Engineering
, pp. 66-77
-
-
Liu, A.1
Zhengy, K.2
Liz, L.3
Liu, G.4
Zhao, L.5
Zhou, X.6
-
24
-
-
84883089676
-
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
-
IEEE Press, New York
-
Jung, T., Mao, X., Li, X.Y., Tang, S.J., Gong, W., Zhang, L.: Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation. In: IEEE INFOCOM 2013, pp. 2634–2642. IEEE Press, New York (2013)
-
(2013)
IEEE INFOCOM 2013
, pp. 2634-2642
-
-
Jung, T.1
Mao, X.2
Li, X.Y.3
Tang, S.J.4
Gong, W.5
Zhang, L.6
|