Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Verifiable computing“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Verifiable computing" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Verifiable computing"
Simunic, Silvio, Dalen Bernaca, and Kristijan Lenac. "Verifiable Computing Applications in Blockchain." IEEE Access 9 (2021): 156729–45. http://dx.doi.org/10.1109/access.2021.3129314.
Der volle Inhalt der QuelleYan, Zheng, Xixun Yu, and Wenxiu Ding. "Context-Aware Verifiable Cloud Computing." IEEE Access 5 (2017): 2211–27. http://dx.doi.org/10.1109/access.2017.2666839.
Der volle Inhalt der QuelleSong, Beibei, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu, and Chuansheng Wang. "Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions." Future Internet 15, no. 4 (2023): 152. http://dx.doi.org/10.3390/fi15040152.
Der volle Inhalt der QuelleSun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu, and Qianhong Wu. "Confidentiality-Preserving Publicly Verifiable Computation." International Journal of Foundations of Computer Science 28, no. 06 (2017): 799–818. http://dx.doi.org/10.1142/s0129054117400196.
Der volle Inhalt der QuelleYao, Shuang, and Dawei Zhang. "An Anonymous Verifiable Random Function with Applications in Blockchain." Wireless Communications and Mobile Computing 2022 (April 19, 2022): 1–12. http://dx.doi.org/10.1155/2022/6467866.
Der volle Inhalt der QuelleJiao, Zi, Fucai Zhou, Qiang Wang, and Jintong Sun. "RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing." Sensors 22, no. 11 (2022): 4012. http://dx.doi.org/10.3390/s22114012.
Der volle Inhalt der QuelleWang, Jianfeng, Xiaofeng Chen, Xinyi Huang, Ilsun You, and Yang Xiang. "Verifiable Auditing for Outsourced Database in Cloud Computing." IEEE Transactions on Computers 64, no. 11 (2015): 3293–303. http://dx.doi.org/10.1109/tc.2015.2401036.
Der volle Inhalt der QuelleXu, Lingling, and Shaohua Tang. "Verifiable computation with access control in cloud computing." Journal of Supercomputing 69, no. 2 (2013): 528–46. http://dx.doi.org/10.1007/s11227-013-1039-z.
Der volle Inhalt der QuelleZhang, Kai, Lifei Wei, Xiangxue Li, and Haifeng Qian. "Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing." Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/6128437.
Der volle Inhalt der QuelleGheorghiu, Alexandru, Elham Kashefi, and Petros Wallden. "Robustness and device independence of verifiable blind quantum computing." New Journal of Physics 17, no. 8 (2015): 083040. http://dx.doi.org/10.1088/1367-2630/17/8/083040.
Der volle Inhalt der QuelleDissertationen zum Thema "Verifiable computing"
Madi, Abbass. "Secure Machine Learning by means of Homomorphic Encryption and Verifiable Computing." Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG019.
Der volle Inhalt der QuelleSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Der volle Inhalt der QuelleAzraoui, Monir. "Vérifiabilité et imputabilité dans le Cloud." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0032/document.
Der volle Inhalt der QuelleAzraoui, Monir. "Vérifiabilité et imputabilité dans le Cloud." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0032.
Der volle Inhalt der QuelleRathi, Nilesh. "Scaling Blockchains Using Coding Theory and Verifiable Computing." Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5203.
Der volle Inhalt der QuelleBücher zum Thema "Verifiable computing"
Demirel, Denise, Lucas Schabhüser, and Johannes Buchmann. Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6.
Der volle Inhalt der QuelleSchabhüser, Lucas, Johannes Buchmann, and Denise Demirel. Privately and Publicly Verifiable Computing Techniques: A Survey. Springer International Publishing AG, 2017.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Verifiable computing"
Xu, Cheng, Ce Zhang, and Jianliang Xu. "Verifiable Cloud Computing." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_299.
Der volle Inhalt der QuelleXu, Cheng, Ce Zhang, and Jianliang Xu. "Verifiable Cloud Computing." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_299-1.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Verifiable Computing for Specific Applications." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_7.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Proof and Argument Based Verifiable Computing." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_3.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Verifiable Computing from Fully Homomorphic Encryption." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_4.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Verifiable Computing Frameworks from Functional Encryption and Functional Signatures." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_6.
Der volle Inhalt der QuelleMadi, Abbass, Renaud Sirdey, and Oana Stan. "Computing Neural Networks with Homomorphic Encryption and Verifiable Computing." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61638-0_17.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Introduction." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_1.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Preliminaries." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_2.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Homomorphic Authenticators." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_5.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Verifiable computing"
Fournet, Cedric, Chantal Keller, and Vincent Laporte. "A Certified Compiler for Verifiable Computing." In 2016 IEEE 29th Computer Security Foundations Symposium (CSF). IEEE, 2016. http://dx.doi.org/10.1109/csf.2016.26.
Der volle Inhalt der QuelleLiu, Shushu, and Zheng Yan. "Verifiable Edge Computing for Indoor Positioning." In ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9148819.
Der volle Inhalt der QuelleGennaro, Rosario. "Verifiable Outsourced Computation." In PODC '17: ACM Symposium on Principles of Distributed Computing. ACM, 2017. http://dx.doi.org/10.1145/3087801.3087872.
Der volle Inhalt der QuelleHsu, Shuo-Fang, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, and Shih-Yu Huang. "Verifiable Visual Cryptography." In 2012 Sixth International Conference on Genetic and Evolutionary Computing (ICGEC). IEEE, 2012. http://dx.doi.org/10.1109/icgec.2012.150.
Der volle Inhalt der QuelleXiang, Tao, Weimin Zhang, and Fei Chen. "A verifiable PSO algorithm in cloud computing." In 2014 IEEE Congress on Evolutionary Computation (CEC). IEEE, 2014. http://dx.doi.org/10.1109/cec.2014.6900252.
Der volle Inhalt der QuelleSekar, Vyas, and Petros Maniatis. "Verifiable resource accounting for cloud computing services." In the 3rd ACM workshop. ACM Press, 2011. http://dx.doi.org/10.1145/2046660.2046666.
Der volle Inhalt der QuelleDolev, Shlomi, and Arseni Kalma. "Verifiable Computing Using Computation Fingerprints Within FHE." In 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA). IEEE, 2021. http://dx.doi.org/10.1109/nca53618.2021.9685831.
Der volle Inhalt der QuelleWen, Zhaocong, Jinman Luo, Huajun Chen, Jiaxiao Meng, Xuan Li, and Jin Li. "A Verifiable Data Deduplication Scheme in Cloud Computing." In 2014 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2014. http://dx.doi.org/10.1109/incos.2014.111.
Der volle Inhalt der QuelleIslam, Mohammad Kamrul, and Ragib Hasan. "Verifiable Data Redundancy in the Cloud." In 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom). IEEE, 2016. http://dx.doi.org/10.1109/bdcloud-socialcom-sustaincom.2016.16.
Der volle Inhalt der QuelleChen, Yi-Hui, Ci-Wei Lan, and Chiao-Chih Huang. "A Verifiable Visual Cryptography Scheme." In 2011 Fifth International Conference on Genetic and Evolutionary Computing (ICGEC). IEEE, 2011. http://dx.doi.org/10.1109/icgec.2011.53.
Der volle Inhalt der Quelle