-
1
-
-
77956778645
-
Secure outsourcing of scientific computations
-
Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.E., Secure outsourcing of scientific computations. Adv. Comput. 54 (2002), 215–272.
-
(2002)
Adv. Comput.
, vol.54
, pp. 215-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.E.4
-
2
-
-
84898945449
-
Multi-prover interactive proofs: how to remove intractability assumptions
-
Ben-Or, M., Goldwasser, S., Kilian, J., Wigderson, A., Multi-prover interactive proofs: how to remove intractability assumptions. Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988, 113–131.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
3
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Benabbas, S., Gennaro, R., Vahlis, Y., Verifiable delegation of computation over large datasets. Proceedings of Advances in Cryptology-CRYPTO 2011, 2011, 111–131.
-
(2011)
Proceedings of Advances in Cryptology-CRYPTO 2011
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
4
-
-
0036867930
-
Preconditioning techniques for large linear systems: a survey
-
Benzi, M., Preconditioning techniques for large linear systems: a survey. J. Comput. Phys. 182:2 (2002), 418–477.
-
(2002)
J. Comput. Phys.
, vol.182
, Issue.2
, pp. 418-477
-
-
Benzi, M.1
-
5
-
-
0000619172
-
Self-testing/correcting with applications to numerical problems
-
Blum, M., Luby, M., Rubinfeld, R., Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci. 47:3 (1993), 549–595.
-
(1993)
J. Comput. Syst. Sci.
, vol.47
, Issue.3
, pp. 549-595
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
6
-
-
85019176675
-
Introduction to secure outsourcing computation
-
Chen, X., Introduction to secure outsourcing computation. Synth. Lect. Inf. Secur., Privacy, Trust 8:2 (2016), 1–93.
-
(2016)
Synth. Lect. Inf. Secur., Privacy, Trust
, vol.8
, Issue.2
, pp. 1-93
-
-
Chen, X.1
-
7
-
-
84916890442
-
New algorithms for secure outsourcing of large-scale systems of linear equations
-
Chen, X., Huang, X., Li, J., Ma, J., New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10:1 (2015), 69–78.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.1
, pp. 69-78
-
-
Chen, X.1
Huang, X.2
Li, J.3
Ma, J.4
-
8
-
-
84962022357
-
New publicly verifiable databases with efficient updates
-
Chen, X., Li, J., Huang, X., Ma, J., Lou, W., New publicly verifiable databases with efficient updates. IEEE Trans. Dependable Secure Comput. 12:5 (2015), 546–556.
-
(2015)
IEEE Trans. Dependable Secure Comput.
, vol.12
, Issue.5
, pp. 546-556
-
-
Chen, X.1
Li, J.2
Huang, X.3
Ma, J.4
Lou, W.5
-
9
-
-
84906242615
-
New algorithms for secure outsourcing of modular exponentiations
-
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W., New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25:9 (2014), 2386–2396.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.9
, pp. 2386-2396
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
10
-
-
84987657487
-
Verifiable computation over large database with incremental updates
-
Chen, X., Li, J., Weng, J., Ma, J., Lou, W., Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65:10 (2016), 3184–3195.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.10
, pp. 3184-3195
-
-
Chen, X.1
Li, J.2
Weng, J.3
Ma, J.4
Lou, W.5
-
11
-
-
50449117974
-
The lorentz transformation and absolute time
-
Dirac, P., The lorentz transformation and absolute time. Physica 19:1 (1953), 888–896.
-
(1953)
Physica
, vol.19
, Issue.1
, pp. 888-896
-
-
Dirac, P.1
-
12
-
-
84979681531
-
Efficient techniques for publicly verifiable delegation of computation
-
Elkhiyaoui, K., Önen, M., Azraoui, M., Molva, R., Efficient techniques for publicly verifiable delegation of computation. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016, 119–128.
-
(2016)
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
, pp. 119-128
-
-
Elkhiyaoui, K.1
Önen, M.2
Azraoui, M.3
Molva, R.4
-
13
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
Fiore, D., Gennaro, R., Publicly verifiable delegation of large polynomials and matrix computations, with applications. Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012, 501–512.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
14
-
-
0029490594
-
Solution of dense systems of linear equations arising from integral-equation formulations
-
Forsman, K., Gropp, W., Kettunen, L., Levine, D., Salonen, J., Solution of dense systems of linear equations arising from integral-equation formulations. IEEE Antennas Propag. Mag. 37:6 (1995), 96–100.
-
(1995)
IEEE Antennas Propag. Mag.
, vol.37
, Issue.6
, pp. 96-100
-
-
Forsman, K.1
Gropp, W.2
Kettunen, L.3
Levine, D.4
Salonen, J.5
-
15
-
-
77957005936
-
Non-interactive verifiable computing: outsourcing computation to untrusted workers
-
Gennaro, R., Gentry, C., Parno, B., Non-interactive verifiable computing: outsourcing computation to untrusted workers. Proceedings of Advances in Cryptology-CRYPTO 2010, 2010, 465–482.
-
(2010)
Proceedings of Advances in Cryptology-CRYPTO 2010
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
17
-
-
0023545076
-
How to play any mental game
-
Goldreich, O., Micali, S., Wigderson, A., How to play any mental game. Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, 218–229.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C., The knowledge complexity of interactive proof systems. SIAM J. Comput. 18:1 (1989), 186–208.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
20
-
-
84964853019
-
Enabling efficient and secure outsourcing of large matrix multiplications
-
Jia, K., Li, H., Liu, D., Yu, S., Enabling efficient and secure outsourcing of large matrix multiplications. Proceedings of 2015 IEEE Global Communications Conference, 2015, 1–6.
-
(2015)
Proceedings of 2015 IEEE Global Communications Conference
, pp. 1-6
-
-
Jia, K.1
Li, H.2
Liu, D.3
Yu, S.4
-
21
-
-
84894444941
-
Automating cloud services life cycle through semantic technologies
-
Joshi, K.P., Yesha, Y., Finin, T., Automating cloud services life cycle through semantic technologies. IEEE Trans. Serv. Comput. 7:1 (2012), 109–122.
-
(2012)
IEEE Trans. Serv. Comput.
, vol.7
, Issue.1
, pp. 109-122
-
-
Joshi, K.P.1
Yesha, Y.2
Finin, T.3
-
23
-
-
84902436467
-
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
-
Lei, X., Liao, X., Huang, T., Heriniaina, F., Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280 (2014), 205–217.
-
(2014)
Inf. Sci.
, vol.280
, pp. 205-217
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Heriniaina, F.4
-
24
-
-
84919819478
-
Outsourcing large matrix inversion computation to a public cloud
-
Lei, X., Liao, X., Huang, T., Li, H., Hu, C., Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1:1 (2013), 78–87.
-
(2013)
IEEE Trans. Cloud Comput.
, vol.1
, Issue.1
, pp. 78-87
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Li, H.4
Hu, C.5
-
25
-
-
84944078971
-
Cloud computing service: the case of large matrix determinant computation
-
Lei, X., Liao, X., Huang, T., Li, H., Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8:5 (2015), 688–700.
-
(2015)
IEEE Trans. Serv. Comput.
, vol.8
, Issue.5
, pp. 688-700
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Li, H.4
-
26
-
-
71749113079
-
Identity-based authentication for cloud computing
-
Li, H., Dai, Y., Tian, L., Yang, H., Identity-based authentication for cloud computing. Proceedings of Cloud Computing, 2009, 157–166.
-
(2009)
Proceedings of Cloud Computing
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
27
-
-
84963766973
-
Enabling efficient publicly verifiable outsourcing computation for matrix multiplication
-
Li, H., Zhang, S., Luan, T.H., Ren, H., Enabling efficient publicly verifiable outsourcing computation for matrix multiplication. Proceedings of 2015 International Telecommunication Networks and Applications Conference, 2015, 44–50.
-
(2015)
Proceedings of 2015 International Telecommunication Networks and Applications Conference
, pp. 44-50
-
-
Li, H.1
Zhang, S.2
Luan, T.H.3
Ren, H.4
-
28
-
-
85028920194
-
Secure attribute-based data sharing for resource-limited users in cloud computing
-
Li, J., Zhang, Y., Chen, X., Xiang, Y., Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72 (2018), 1–12.
-
(2018)
Comput. Secur.
, vol.72
, pp. 1-12
-
-
Li, J.1
Zhang, Y.2
Chen, X.3
Xiang, Y.4
-
29
-
-
85070850121
-
Privacy-preserving Outsourced Classification in Cloud Computing
-
Li, P., Li, J., Huang, Z., Gao, C.Z., Chen, W.B., Chen, K., Privacy-preserving Outsourced Classification in Cloud Computing. Cluster Computing, 2017, 1–10.
-
(2017)
Cluster Computing
, pp. 1-10
-
-
Li, P.1
Li, J.2
Huang, Z.3
Gao, C.Z.4
Chen, W.B.5
Chen, K.6
-
30
-
-
85018906248
-
Multi-key privacy-preserving deep learning in cloud computing
-
Li, P., Li, J., Huang, Z., Li, T., Gao, C.Z., Yiu, S.M., Chen, K., Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74 (2017), 76–85.
-
(2017)
Future Gener. Comput. Syst.
, vol.74
, pp. 76-85
-
-
Li, P.1
Li, J.2
Huang, Z.3
Li, T.4
Gao, C.Z.5
Yiu, S.M.6
Chen, K.7
-
31
-
-
84945485084
-
Kdvem: a k-degree anonymity with vertex and edge modification algorithm
-
Ma, T., Zhang, Y., Cao, J., Shen, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Kdvem: a k-degree anonymity with vertex and edge modification algorithm. Computing 97:12 (2015), 1165–1184.
-
(2015)
Computing
, vol.97
, Issue.12
, pp. 1165-1184
-
-
Ma, T.1
Zhang, Y.2
Cao, J.3
Shen, J.4
Tang, M.5
Tian, Y.6
Al-Dhelaan, A.7
Al-Rodhaan, M.8
-
32
-
-
84903852537
-
Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming
-
Nie, H., Chen, X., Li, J., Liu, J., Lou, W., Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming. Proceedings of IEEE 28th International Conference on Advanced Information Networking and Applications, 2014, 591–596.
-
(2014)
Proceedings of IEEE 28th International Conference on Advanced Information Networking and Applications
, pp. 591-596
-
-
Nie, H.1
Chen, X.2
Li, J.3
Liu, J.4
Lou, W.5
-
33
-
-
84894430070
-
A scalable architecture for automatic service composition
-
Paik, I., Chen, W., Huhns, M.N., A scalable architecture for automatic service composition. IEEE Trans. Serv. Comput. 7:1 (2014), 82–95.
-
(2014)
IEEE Trans. Serv. Comput.
, vol.7
, Issue.1
, pp. 82-95
-
-
Paik, I.1
Chen, W.2
Huhns, M.N.3
-
34
-
-
84883814353
-
Themis: a mutually verifiable billing system for the cloud computing environment
-
Park, K.W., Han, J., Chung, J.W., Park, K.H., Themis: a mutually verifiable billing system for the cloud computing environment. IEEE Trans. Serv. Comput. 6:3 (2013), 300–313.
-
(2013)
IEEE Trans. Serv. Comput.
, vol.6
, Issue.3
, pp. 300-313
-
-
Park, K.W.1
Han, J.2
Chung, J.W.3
Park, K.H.4
-
35
-
-
84881259359
-
Pinocchio: Nearly practical verifiable computation
-
Parno, B., Howell, J., Gentry, C., Raykova, M., Pinocchio: Nearly practical verifiable computation. Proceedings of 2013 IEEE Symposium on Security and Privacy, 2013, 238–252.
-
(2013)
Proceedings of 2013 IEEE Symposium on Security and Privacy
, pp. 238-252
-
-
Parno, B.1
Howell, J.2
Gentry, C.3
Raykova, M.4
-
36
-
-
84858307151
-
How to delegate and verify in public: verifiable computation from attribute-based encryption
-
Parno, B., Raykova, M., Vaikuntanathan, V., How to delegate and verify in public: verifiable computation from attribute-based encryption. in: Proceedings of Theory of Cryptography Conference, 2012, 422–439.
-
(2012)
in: Proceedings of Theory of Cryptography Conference
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
37
-
-
84862907810
-
Security challenges for the public cloud
-
Ren, K., Wang, C., Wang, Q., Security challenges for the public cloud. IEEE Internet Comput. 16:1 (2012), 69–73.
-
(2012)
IEEE Internet Comput.
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
38
-
-
84954231523
-
Efficient secure outsourcing of largescale linear systems of equations
-
Salinas, S., Luo, C., Chen, X., Li, P., Efficient secure outsourcing of largescale linear systems of equations. Proceedings of 2015 IEEE Conference on Computer Communications, 2015, 1035–1043.
-
(2015)
Proceedings of 2015 IEEE Conference on Computer Communications
, pp. 1035-1043
-
-
Salinas, S.1
Luo, C.2
Chen, X.3
Li, P.4
-
39
-
-
85020435750
-
An efficient public auditing protocol with novel dynamic structure for cloud data
-
Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W., An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12:10 (2017), 2402–2415.
-
(2017)
IEEE Trans. Inf. Forensics Secur.
, vol.12
, Issue.10
, pp. 2402-2415
-
-
Shen, J.1
Shen, J.2
Chen, X.3
Huang, X.4
Susilo, W.5
-
40
-
-
84989856350
-
MD-VCmatrix: an efficient scheme for publicly verifiable computation of outsourced matrix multiplication
-
Sheng, G., Tang, C., Gao, W., Yin, Y., MD-VCmatrix: an efficient scheme for publicly verifiable computation of outsourced matrix multiplication. Proceedings of International Conference on Network and System Security, 2016, 349–362.
-
(2016)
Proceedings of International Conference on Network and System Security
, pp. 349-362
-
-
Sheng, G.1
Tang, C.2
Gao, W.3
Yin, Y.4
-
41
-
-
84881262940
-
A hybrid architecture for interactive verifiable computation
-
Vu, V., Setty, S., Blumberg, A.J., Walfish, M., A hybrid architecture for interactive verifiable computation. Proceedings of 2013 IEEE Symposium on Security and Privacy, 2013, 223–237.
-
(2013)
Proceedings of 2013 IEEE Symposium on Security and Privacy
, pp. 223-237
-
-
Vu, V.1
Setty, S.2
Blumberg, A.J.3
Walfish, M.4
-
42
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Wang, C., Cao, N., Ren, K., Lou, W., Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23:8 (2012), 1467–1479.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
43
-
-
84961752964
-
Secure optimization computation outsourcing in cloud computing: a case study of linear programming
-
Wang, C., Ren, K., Wang, J., Secure optimization computation outsourcing in cloud computing: a case study of linear programming. IEEE Trans. Comput. 65:1 (2016), 216–229.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.1
, pp. 216-229
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
44
-
-
84877785052
-
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
-
Wang, C., Ren, K., Wang, J., Wang, Q., Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Trans. Parallel Distrib. Syst. 24:6 (2013), 1172–1181.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.6
, pp. 1172-1181
-
-
Wang, C.1
Ren, K.2
Wang, J.3
Wang, Q.4
-
45
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W., Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5:2 (2012), 220–232.
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
46
-
-
84961746418
-
Privacy-assured outsourcing of image reconstruction service in cloud
-
Wang, C., Zhang, B., Ren, K., Roveda, J.M., Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1:1 (2013), 166–177.
-
(2013)
IEEE Trans. Emerg. Top. Comput.
, vol.1
, Issue.1
, pp. 166-177
-
-
Wang, C.1
Zhang, B.2
Ren, K.3
Roveda, J.M.4
-
47
-
-
84960539113
-
Verifiable auditing for outsourced database in cloud computing
-
Wang, J., Chen, X., Huang, X., You, I., Xiang, Y., Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64:11 (2015), 3293–3303.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.11
, pp. 3293-3303
-
-
Wang, J.1
Chen, X.2
Huang, X.3
You, I.4
Xiang, Y.5
-
51
-
-
78649302229
-
Cloud computing: state-of-theart and research challenges
-
Zhang, Q., Cheng, L., Boutaba, R., Cloud computing: state-of-theart and research challenges. J. Internet Serv. Appl. 1:1 (2010), 7–18.
-
(2010)
J. Internet Serv. Appl.
, vol.1
, Issue.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
-
52
-
-
85019179676
-
New publicly verifiable computation for batch matrix multiplication
-
Zhang, X., Jiang, T., Li, K.C., Chen, X., New publicly verifiable computation for batch matrix multiplication. Proceedings of International Conference on Green, Pervasive, and Cloud Computing, 2017, 53–65.
-
(2017)
Proceedings of International Conference on Green, Pervasive, and Cloud Computing
, pp. 53-65
-
-
Zhang, X.1
Jiang, T.2
Li, K.C.3
Chen, X.4
|