-
1
-
-
85019176675
-
Introduction to secure outsourcing computation
-
Chen, X.: Introduction to secure outsourcing computation. Synth. Lect. Inf. Secur. Priv. Trust 8, 1–93 (2016)
-
(2016)
Synth. Lect. Inf. Secur. Priv. Trust
, vol.8
, pp. 1-93
-
-
Chen, X.1
-
2
-
-
84894444941
-
Automating cloud services life cycle through semantic technologies
-
Joshi, K.P., Yesha, Y., Finin, T.: Automating cloud services life cycle through semantic technologies. IEEE Trans. Serv. Comput. 7, 109–122 (2012)
-
(2012)
IEEE Trans. Serv. Comput
, vol.7
, pp. 109-122
-
-
Joshi, K.P.1
Yesha, Y.2
Finin, T.3
-
3
-
-
84894430070
-
A scalable architecture for automatic service composition
-
Paik, I., Chen, W., Huhns, M.N.: A scalable architecture for automatic service composition. IEEE Trans. Serv. Comput. 7, 82–95 (2014)
-
(2014)
IEEE Trans. Serv. Comput
, vol.7
, pp. 82-95
-
-
Paik, I.1
Chen, W.2
Huhns, M.N.3
-
4
-
-
84883814353
-
Themis: A mutually verifiable billing system for the cloud computing environment
-
Park, K.W., Han, J., Chung, J.W., Park, K.H.: Themis: a mutually verifiable billing system for the cloud computing environment. IEEE Trans. Serv. Comput. 6, 300– 313 (2013)
-
(2013)
IEEE Trans. Serv. Comput.
, vol.6
-
-
Park, K.W.1
Han, J.2
Chung, J.W.3
Park, K.H.4
-
5
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5, 220–232 (2012)
-
(2012)
IEEE Trans. Serv. Comput
, vol.5
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
6
-
-
84961746418
-
Privacy-assured outsourcing of image reconstruction service in cloud
-
Wang, C., Zhang, B., Ren, K., Roveda, J.M.: Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1, 166–177 (2013)
-
(2013)
IEEE Trans. Emerg. Top. Comput
, vol.1
, pp. 166-177
-
-
Wang, C.1
Zhang, B.2
Ren, K.3
Roveda, J.M.4
-
7
-
-
84916890442
-
New algorithms for secure outsourcing of large-scale systems of linear equations
-
Chen, X., Huang, X., Li, J., Ma, J.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10, 69– 78 (2015)
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
-
-
Chen, X.1
Huang, X.2
Li, J.3
Ma, J.4
-
8
-
-
84902436467
-
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud.
-
Lei, X., Liao, X., Huang, T., Heriniaina, F.: Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 205–217 (2014)
-
(2014)
Inf. Sci.
, vol.280
, pp. 205-217
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Heriniaina, F.4
-
9
-
-
84919819478
-
Outsourcing large matrix inversion computation to a public cloud
-
Lei, X., Liao, X., Huang, T., Li, H.: Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1, 1 (2013)
-
(2013)
IEEE Trans. Cloud Comput
, vol.1
, pp. 1
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Li, H.4
-
10
-
-
84944078971
-
Cloud computing service: The case of large matrix determinant computation
-
Lei, X., Liao, X., Huang, T., Li, H.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8, 688–700 (2015)
-
(2015)
IEEE Trans. Serv. Comput
, vol.8
, pp. 688-700
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Li, H.4
-
11
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: ACM Conference on Computer and Communications Security, pp. 501–512(2012)
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
12
-
-
84906483939
-
Verifiable delegation of computations with storage-verification trade-off
-
Kuty̷lowski, M., Vaidya, J. (eds.) ESORICS 2014, Springer, Cham
-
Zhang, L.F., Safavi-Naini, R.: Verifiable delegation of computations with storage-verification trade-off. In: Kuty̷lowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 112–129. Springer, Cham (2014). doi:10.1007/978-3-319-11203-9 7
-
(2014)
LNCS
, vol.8712
, pp. 112-129
-
-
Zhang, L.F.1
Safavi-Naini, R.2
-
13
-
-
84921350434
-
Efficient secure and verifiable outsourcing of matrix multiplications
-
Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC 2014, Springer, Cham
-
Zhang, Y., Blanton, M.: Efficient secure and verifiable outsourcing of matrix multiplications. In: Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC 2014. LNCS, vol. 8783, pp. 158–178. Springer, Cham (2014). doi:10.1007/978-3-319-13257-0 10
-
(2014)
LNCS
, vol.8783
, pp. 158-178
-
-
Zhang, Y.1
Blanton, M.2
-
14
-
-
84979681531
-
Efficient techniques for publicly verifiable delegation of computation
-
Elkhiyaoui, K., Önen, M., Azraoui, M., Molva, R.: Efficient techniques for publicly verifiable delegation of computation. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, China, 30 May–3 June 2016, pp. 119–128 (2016)
-
(2016)
Proceedings of the 11Th ACM on Asia Conference on Computer and Communications Security, Asiaccs 2016, Xi’an, China, 30 May–3 June 2016
, pp. 119-128
-
-
Elkhiyaoui, K.1
Önen, M.2
Azraoui, M.3
Molva, R.4
-
15
-
-
84989856350
-
MD-VCMatrix: An efficient scheme for publicly verifiable computation of outsourced matrix multiplication
-
Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016, Springer, Cham
-
Sheng, G., Tang, C., Gao, W., Yin, Y.: MD-VCMatrix: an efficient scheme for publicly verifiable computation of outsourced matrix multiplication. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016. LNCS, vol. 9955, pp. 349–362. Springer, Cham (2016). doi:10.1007/978-3-319-46298-1 23
-
(2016)
LNCS
, vol.9955
, pp. 349-362
-
-
Sheng, G.1
Tang, C.2
Gao, W.3
Yin, Y.4
-
16
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Rabin, T. (ed.) CRYPTO 2010, Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7 25
-
(2010)
LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
17
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
Cramer, R. (ed.) TCC 2012, Springer, Heidelberg
-
Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422–439. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28914-9 24
-
(2012)
LNCS
, vol.7194
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
|