Literatura académica sobre el tema "Secure Outsourced Computation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Secure Outsourced Computation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Secure Outsourced Computation"
Olakanmi, Oladayo Olufemi y Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms". International Journal of Cloud Applications and Computing 9, n.º 2 (abril de 2019): 79–98. http://dx.doi.org/10.4018/ijcac.2019040105.
Texto completoBlanton, Marina y Mehrdad Aliasgari. "Secure outsourced computation of iris matching". Journal of Computer Security 20, n.º 2-3 (12 de junio de 2012): 259–305. http://dx.doi.org/10.3233/jcs-2012-0447.
Texto completoSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin y Wenmin Li. "Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/413265.
Texto completoShao, Jun y Guiyi Wei. "Secure Outsourced Computation in Connected Vehicular Cloud Computing". IEEE Network 32, n.º 3 (mayo de 2018): 36–41. http://dx.doi.org/10.1109/mnet.2018.1700345.
Texto completoTreiber, Amos, Andreas Nautsch, Jascha Kolberg, Thomas Schneider y Christoph Busch. "Privacy-preserving PLDA speaker verification using outsourced secure computation". Speech Communication 114 (noviembre de 2019): 60–71. http://dx.doi.org/10.1016/j.specom.2019.09.004.
Texto completoYang, Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo y Victor Chang. "A Comprehensive Survey on Secure Outsourced Computation and Its Applications". IEEE Access 7 (2019): 159426–65. http://dx.doi.org/10.1109/access.2019.2949782.
Texto completoHong, Jun, Tao Wen, Quan Guo y Zhengwang Ye. "Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud". Mathematical Problems in Engineering 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/8109730.
Texto completoYang, Guangcan, Jiayang Li, Yunhua He, Ke Xiao, Yang Xin, Hongliang Zhu y Chen Li. "A Security-Enhanced Query Result Verification Scheme for Outsourced Data in Location-Based Services". Applied Sciences 12, n.º 16 (13 de agosto de 2022): 8126. http://dx.doi.org/10.3390/app12168126.
Texto completoZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu y Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Texto completoSong, Mingyang y Yingpeng Sang. "Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud". Sensors 21, n.º 20 (14 de octubre de 2021): 6821. http://dx.doi.org/10.3390/s21206821.
Texto completoTesis sobre el tema "Secure Outsourced Computation"
Wang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems". UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Texto completoSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud". Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Texto completoPh. D.
Papadopoulos, Dimitrios. "Function-specific schemes for verifiable computation". Thesis, 2016. https://hdl.handle.net/2144/19746.
Texto completoAjith, S. "MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning". Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5543.
Texto completoCapítulos de libros sobre el tema "Secure Outsourced Computation"
Loftus, Jake y Nigel P. Smart. "Secure Outsourced Computation". En Lecture Notes in Computer Science, 1–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21969-6_1.
Texto completoHyla, Tomasz y Jerzy Pejaś. "Secure Outsourced Bilinear Pairings Computation for Mobile Devices". En Network and System Security, 519–29. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_34.
Texto completoHacıgümüş, Hakan, Bala Iyer y Sharad Mehrotra. "Secure Computation on Outsourced Data: A 10-year Retrospective". En Database Systems for Advanced Applications, 16–27. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05810-8_2.
Texto completoZhang, Xin, Chao Shan y Yunfeng Zou. "Multi-party Secure Comparison of Strings Based on Outsourced Computation". En Machine Learning for Cyber Security, 15–30. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20099-1_2.
Texto completoThangam, V. y K. Chandrasekaran. "Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment". En Communications in Computer and Information Science, 199–212. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2738-3_17.
Texto completoThießen, Thore y Jan Vahrenhold. "Klee’s Measure Problem Made Oblivious". En LATIN 2022: Theoretical Informatics, 121–38. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-20624-5_8.
Texto completoDang, Hung, Dat Le Tien y Ee-Chien Chang. "Towards a Marketplace for Secure Outsourced Computations". En Lecture Notes in Computer Science, 790–808. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29959-0_38.
Texto completoHohenberger, Susan y Anna Lysyanskaya. "How to Securely Outsource Cryptographic Computations". En Theory of Cryptography, 264–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30576-7_15.
Texto completoZhao, Liang. "Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation". En Topics in Cryptology – CT-RSA 2019, 514–34. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12612-4_26.
Texto completoZhang, Jiuling, Shijun Shen y Daochao Huang. "A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing". En Communications in Computer and Information Science, 29–36. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_3.
Texto completoActas de conferencias sobre el tema "Secure Outsourced Computation"
Cao, Chenglong y Xiaoling Zhu. "Secure and Verifiable Outsourced Computation Based on Blockchain". En 2023 4th Information Communication Technologies Conference (ICTC). IEEE, 2023. http://dx.doi.org/10.1109/ictc57116.2023.10154879.
Texto completoJiang, Xiaoqian, Miran Kim, Kristin Lauter y Yongsoo Song. "Secure Outsourced Matrix Computation and Application to Neural Networks". En CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3243734.3243837.
Texto completoRong, Hong, Huimei Wang, Jian Liu, Wei Wu y Ming Xian. "Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments". En 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0069.
Texto completoGuo, Shu y Haixia Xu. "A Non-interactive Secure Outsourced Computation Scheme in Multi-party Cloud". En 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2012. http://dx.doi.org/10.1109/incos.2012.50.
Texto completoChen, Huajie, Ali Burak Ünal, Mete Akgün y Nico Pfeifer. "Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation". En CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3375708.3380316.
Texto completoWang, Zhaohong y Jing Guo. "Denoising Signals on the Graph for Distributed Systems by Secure Outsourced Computation". En 2021 IEEE 7th World Forum on Internet of Things (WF-IoT). IEEE, 2021. http://dx.doi.org/10.1109/wf-iot51360.2021.9595245.
Texto completoKrol, Michal y Ioannis Psaras. "SPOC: Secure Payments for Outsourced Computations". En Workshop on Decentralized IoT Security and Standards. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/diss.2018.23002.
Texto completoCachin, Christian. "Session details: Session 8A -- Secure Outsourced Computations". En CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/3255164.
Texto completoLi, Yaohang, Ravi Mukkamala y Michael Mascagni. "Validating the Correctness of Outsourced Computational Tasks Using Pseudorandom Number Generators". En 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.81.
Texto completo