-
2
-
-
0037995929
-
SETI@home: An experiment in public-resource computing
-
Nov
-
D. P. Anderson et al. SETI@home: An experiment in public-resource computing. CACM, 45(11):56-61, Nov. 2002.
-
(2002)
CACM
, vol.45
, Issue.11
, pp. 56-61
-
-
Anderson, D. P.1
-
3
-
-
0032058198
-
Proof verification and the hardness of approximation problems
-
May
-
S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems. Journal of the ACM, 45(3):501-555, May 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.3
, pp. 501-555
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
4
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
M. J. Atallah and K. B. Frikken. Securely outsourcing linear algebra computations. In ASIACCS, 2010.
-
(2010)
ASIACCS
-
-
Atallah, M. J.1
Frikken, K. B.2
-
6
-
-
48949100471
-
Improved neighborhood-based collaborative filtering
-
R. M. Bell and Y. Koren. Improved neighborhood-based collaborative filtering. In KDD Cup and Workshop, 2007.
-
(2007)
KDD Cup and Workshop
-
-
Bell, R. M.1
Koren, Y.2
-
7
-
-
34547829716
-
-
Dec
-
E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan, and S. Vadhan. Robust PCPs of proximity, shorter PCPs and applications to coding. 36(4):889-974, Dec. 2006.
-
(2006)
Robust PCPs of proximity, shorter PCPs and applications to coding
, vol.36
, Issue.4
, pp. 889-974
-
-
Ben-Sasson, E.1
Goldreich, O.2
Harsha, P.3
Sudan, M.4
Vadhan, S.5
-
8
-
-
0029214558
-
Designing programs that check their work
-
M. Blum and S. Kannan. Designing programs that check their work. Journal of the ACM, 42(1):269-291, 1995.
-
(1995)
Journal of the ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
9
-
-
0345757358
-
Practical Byzantine fault tolerance and proactive recovery
-
M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM TOCS, 20(4):398-461, 2002.
-
(2002)
ACM TOCS
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
10
-
-
84856435337
-
Proof-carrying data and hearsay arguments from signature cards
-
A. Chiesa and E. Tromer. Proof-carrying data and hearsay arguments from signature cards. In ICS, 2010.
-
(2010)
ICS
-
-
Chiesa, A.1
Tromer, E.2
-
11
-
-
84893475005
-
Augmented smart phone applications through clone cloud execution
-
B.-G. Chun and P. Maniatis. Augmented smart phone applications through clone cloud execution. In HotOS, 2009.
-
(2009)
HotOS
-
-
Chun, B.-G.1
Maniatis, P.2
-
12
-
-
79960854270
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, 2010.
-
(2010)
CRYPTO
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
13
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, 2009.
-
(2009)
STOC
-
-
Gentry, C.1
-
14
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating computation: Interactive proofs for muggles. In STOC, 2008.
-
(2008)
STOC
-
-
Goldwasser, S.1
Kalai, Y. T.2
Rothblum, G. N.3
-
15
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Comp., 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Comp
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
16
-
-
85051027713
-
Linear algebra with sub-linear zero-knowledge arguments
-
J. Groth. Linear algebra with sub-linear zero-knowledge arguments. In CRYPTO, 2009.
-
(2009)
CRYPTO
-
-
Groth, J.1
-
17
-
-
58049120018
-
PeerReview: Practical accountability for distributed systems
-
A. Haeberlen, P. Kouznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. In SOSP, 2007.
-
(2007)
SOSP
-
-
Haeberlen, A.1
Kouznetsov, P.2
Druschel, P.3
-
19
-
-
0344407518
-
Improved efficient arguments (preliminary version)
-
J. Kilian. Improved efficient arguments (preliminary version). In CRYPTO, 1995.
-
(1995)
CRYPTO
-
-
Kilian, J.1
-
21
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In EuroSys, 2008.
-
(2008)
EuroSys
-
-
McCune, J. M.1
Parno, B. J.2
Perrig, A.3
Reiter, M. K.4
Isozaki, H.5
-
22
-
-
0034854953
-
Computationally sound proofs
-
S. Micali. Computationally sound proofs. SIAM Journal on Comp., 30(4):1253-1298, 2000.
-
(2000)
SIAM Journal on Comp
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
23
-
-
79959671737
-
Ensuring content integrity for untrusted peer-to-peer content distribution networks
-
N. Michalakis, R. Soulè, and R. Grimm. Ensuring content integrity for untrusted peer-to-peer content distribution networks. In NSDI, 2007.
-
(2007)
NSDI
-
-
Michalakis, N.1
Soulè, R.2
Grimm, R.3
-
24
-
-
0006839339
-
Distributed execution with remote audit
-
F. Monrose, P. Wycko, and A. D. Rubin. Distributed execution with remote audit. In NDSS, 1999.
-
(1999)
NDSS
-
-
Monrose, F.1
Wycko, P.2
Rubin, A. D.3
-
26
-
-
79951998286
-
Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency
-
A.-R. Sadeghi, T. Schneider, and M. Winandy. Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In TRUST, 2010.
-
(2010)
TRUST
-
-
Sadeghi, A.-R.1
Schneider, T.2
Winandy, M.3
-
29
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In SOSP, 2005.
-
(2005)
SOSP
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
30
-
-
85092661186
-
-
Technical Report TR-11-16, Dept. of CS, UT Austin, Apr
-
S. Setty, A. J. Blumberg, and M. Walfish. Toward practical and unconditional verification of remote computations (supplement). Technical Report TR-11-16, Dept. of CS, UT Austin, Apr. 2011.
-
(2011)
Toward practical and unconditional verification of remote computations (supplement)
-
-
Setty, S.1
Blumberg, A. J.2
Walfish, M.3
-
31
-
-
33745601730
-
Query execution assurance for outsourced databases
-
R. Sion. Query execution assurance for outsourced databases. In VLDB, 2005.
-
(2005)
VLDB
-
-
Sion, R.1
-
32
-
-
0022882770
-
How to generate and exchange secrets
-
A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
-
(1986)
FOCS
-
-
Yao, A. C.-C.1
|