Artículos de revistas sobre el tema "Verifiable computing"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Verifiable computing".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Simunic, Silvio, Dalen Bernaca y Kristijan Lenac. "Verifiable Computing Applications in Blockchain". IEEE Access 9 (2021): 156729–45. http://dx.doi.org/10.1109/access.2021.3129314.
Texto completoYan, Zheng, Xixun Yu y Wenxiu Ding. "Context-Aware Verifiable Cloud Computing". IEEE Access 5 (2017): 2211–27. http://dx.doi.org/10.1109/access.2017.2666839.
Texto completoSong, Beibei, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu y Chuansheng Wang. "Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions". Future Internet 15, n.º 4 (21 de abril de 2023): 152. http://dx.doi.org/10.3390/fi15040152.
Texto completoSun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu y Qianhong Wu. "Confidentiality-Preserving Publicly Verifiable Computation". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 799–818. http://dx.doi.org/10.1142/s0129054117400196.
Texto completoYao, Shuang y Dawei Zhang. "An Anonymous Verifiable Random Function with Applications in Blockchain". Wireless Communications and Mobile Computing 2022 (19 de abril de 2022): 1–12. http://dx.doi.org/10.1155/2022/6467866.
Texto completoJiao, Zi, Fucai Zhou, Qiang Wang y Jintong Sun. "RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing". Sensors 22, n.º 11 (25 de mayo de 2022): 4012. http://dx.doi.org/10.3390/s22114012.
Texto completoWang, Jianfeng, Xiaofeng Chen, Xinyi Huang, Ilsun You y Yang Xiang. "Verifiable Auditing for Outsourced Database in Cloud Computing". IEEE Transactions on Computers 64, n.º 11 (1 de noviembre de 2015): 3293–303. http://dx.doi.org/10.1109/tc.2015.2401036.
Texto completoXu, Lingling y Shaohua Tang. "Verifiable computation with access control in cloud computing". Journal of Supercomputing 69, n.º 2 (29 de octubre de 2013): 528–46. http://dx.doi.org/10.1007/s11227-013-1039-z.
Texto completoZhang, Kai, Lifei Wei, Xiangxue Li y Haifeng Qian. "Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing". Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/6128437.
Texto completoGheorghiu, Alexandru, Elham Kashefi y Petros Wallden. "Robustness and device independence of verifiable blind quantum computing". New Journal of Physics 17, n.º 8 (19 de agosto de 2015): 083040. http://dx.doi.org/10.1088/1367-2630/17/8/083040.
Texto completoZhu, Yixiao, Hui Li, Jiangtao Cui y Yong Ma. "Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing". IEEE Access 7 (2019): 169636–45. http://dx.doi.org/10.1109/access.2019.2955243.
Texto completoAusekar, Swapnil Ramesh y Syam Kumar Pasupuleti. "Dynamic Verifiable Outsourced Database with Freshness in Cloud Computing". Procedia Computer Science 143 (2018): 367–77. http://dx.doi.org/10.1016/j.procs.2018.10.408.
Texto completoSu, Yaping, Jianfeng Wang, Yunling Wang y Meixia Miao. "Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing". IEEE Access 7 (2019): 141352–62. http://dx.doi.org/10.1109/access.2019.2943971.
Texto completoXu, Qingshan, Xiaoqing Tan y Rui Huang. "Improved Resource State for Verifiable Blind Quantum Computation". Entropy 22, n.º 9 (7 de septiembre de 2020): 996. http://dx.doi.org/10.3390/e22090996.
Texto completoEL-YAHYAOUI, Ahmed y Mohamed Dafir ECH-CHERIF EL KETTANI. "A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security". Technologies 7, n.º 1 (6 de febrero de 2019): 21. http://dx.doi.org/10.3390/technologies7010021.
Texto completowu, Junhua, Wenzhen Feng, Guopeng Liang, Tiantian Wang, Guangshun Li y Yuanwang Zheng. "A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing". Security and Communication Networks 2022 (10 de marzo de 2022): 1–12. http://dx.doi.org/10.1155/2022/4095427.
Texto completoFu, Moxuan, Chuan Zhang, Chenfei Hu, Tong Wu, Jinyang Dong y Liehuang Zhu. "Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains". Entropy 25, n.º 7 (13 de julio de 2023): 1058. http://dx.doi.org/10.3390/e25071058.
Texto completoLi, Cheng, Li Yang y Jianfeng Ma. "A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model". Wireless Communications and Mobile Computing 2020 (17 de noviembre de 2020): 1–16. http://dx.doi.org/10.1155/2020/8825623.
Texto completoNiu, Kun, Changgen Peng, Weijie Tan, Zhou Zhou y Yi Xu. "Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing". Security and Communication Networks 2021 (28 de abril de 2021): 1–11. http://dx.doi.org/10.1155/2021/6654539.
Texto completoZhu, Yixiao, Wenjie Ma, Jiangtao Cui, Xiaofang Xia, Yanguo Peng y Jianting Ning. "PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing". Security and Communication Networks 2021 (28 de mayo de 2021): 1–18. http://dx.doi.org/10.1155/2021/5514137.
Texto completoRuiting, SHAN, CHEN Xiubo, XU Gang, DOU Zhao, LI Zongpeng, MIAO Lihua y YANG Yixian. "Verifiable Multi‐Party Universal Blind Quantum Computing in Distributed Networks". Chinese Journal of Electronics 30, n.º 4 (julio de 2021): 712–18. http://dx.doi.org/10.1049/cje.2021.05.013.
Texto completoShen, Jian, Dengzhi Liu, Md Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun y Aniello Castiglione. "Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing". IEEE Transactions on Emerging Topics in Computing 8, n.º 2 (1 de abril de 2020): 280–90. http://dx.doi.org/10.1109/tetc.2017.2776402.
Texto completoPremnath, Sriram N. y Zygmunt J. Haas. "A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems". Procedia Computer Science 34 (2014): 474–83. http://dx.doi.org/10.1016/j.procs.2014.07.033.
Texto completoWang, Hao, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao y Minghao Zhao. "Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing". Soft Computing 21, n.º 24 (13 de julio de 2016): 7325–35. http://dx.doi.org/10.1007/s00500-016-2271-2.
Texto completoLi, Jianwei, Xiaoming Wang y Qingqing Gan. "Verifiable Data Search with Fine-Grained Authorization in Edge Computing". Security and Communication Networks 2022 (10 de noviembre de 2022): 1–15. http://dx.doi.org/10.1155/2022/4252466.
Texto completoS, Aswin, Chandru V, Mathan Raj y K. Ashok Kumar. "Secure Date Storage Using ECC Encryption with Verifiable Data Sharing in Cloud". International Research Journal of Computer Science 11, n.º 04 (5 de abril de 2024): 230–33. http://dx.doi.org/10.26562/irjcs.2024.v1104.16.
Texto completoZhang, Tao, Xiongfei Song, Lele Zheng, Yani Han, Kai Zhang y Qi Li. "Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing". Security and Communication Networks 2021 (22 de enero de 2021): 1–14. http://dx.doi.org/10.1155/2021/6679157.
Texto completoG, Kulkarni Vaibhav. "Secure Integrity Auditing System for Electronic Patient Health Records using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 10, n.º 1 (31 de enero de 2022): 1536–38. http://dx.doi.org/10.22214/ijraset.2022.40089.
Texto completoWang, Jianfeng, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma y Xiaofeng Chen. "Efficient verifiable fuzzy keyword search over encrypted data in cloud computing". Computer Science and Information Systems 10, n.º 2 (2013): 667–84. http://dx.doi.org/10.2298/csis121104028w.
Texto completoChang, Ya-Fen. "Flexible Access Control over Verifiable Cloud Computing Services with Provable Security". Informatica 26, n.º 2 (1 de enero de 2015): 181–98. http://dx.doi.org/10.15388/informatica.2015.44.
Texto completoPark, Ki-Woong, Jaesun Han, JaeWoong Chung y Kyu Ho Park. "THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment". IEEE Transactions on Services Computing 6, n.º 3 (julio de 2013): 300–313. http://dx.doi.org/10.1109/tsc.2012.1.
Texto completoZhang, Xiaoyu, Xiaofeng Chen, Jianfeng Wang, Zhihui Zhan y Jin Li. "Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing". Soft Computing 22, n.º 23 (16 de mayo de 2018): 7719–32. http://dx.doi.org/10.1007/s00500-018-3233-7.
Texto completoMohammed, Nedal, Laman R. Sultan y Santosh Lomte. "Privacy preserving outsourcing algorithm for two-point linear boundary value problems". Indonesian Journal of Electrical Engineering and Computer Science 16, n.º 2 (1 de noviembre de 2019): 1065. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp1065-1069.
Texto completoKaremallaiah, Jayalakshmi y Prabha Revaiah. "Verifiable data distribution technique for multiple applicants in a cloud computing ecosystem". IAES International Journal of Artificial Intelligence (IJ-AI) 13, n.º 2 (1 de junio de 2024): 1241. http://dx.doi.org/10.11591/ijai.v13.i2.pp1241-1249.
Texto completoWu, Hongfeng y Jingjing Yan. "Outsourcing Computing of Large Matrix Jordan Decomposition". Mathematical Problems in Engineering 2019 (19 de agosto de 2019): 1–7. http://dx.doi.org/10.1155/2019/6410626.
Texto completoEl-Yahyaoui, Ahmed y Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques". International Journal of Embedded and Real-Time Communication Systems 10, n.º 3 (julio de 2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Texto completoTang, Yongli, Minglu Jin, Hui Meng, Li Yang y Chengfu Zheng. "Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme". Entropy 25, n.º 5 (19 de mayo de 2023): 822. http://dx.doi.org/10.3390/e25050822.
Texto completoCao, Laicheng, Wenwen He, Xian Guo y Tao Feng. "A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment". Mathematical Problems in Engineering 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/9267608.
Texto completoFan, Kai, Junxiong Wang, Xin Wang, Hui Li y Yintang Yang. "A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing". Sensors 17, n.º 7 (24 de julio de 2017): 1695. http://dx.doi.org/10.3390/s17071695.
Texto completoZhou, Kai, M. H. Afifi y Jian Ren. "ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing". IEEE Transactions on Information Forensics and Security 12, n.º 11 (noviembre de 2017): 2518–31. http://dx.doi.org/10.1109/tifs.2017.2710941.
Texto completoTao, Xiaoling, Kai Nie y Yunling Wang. "Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing". International Journal of Embedded Systems 11, n.º 6 (2019): 707. http://dx.doi.org/10.1504/ijes.2019.10025616.
Texto completoNie, Kai, Yunling Wang y Xiaoling Tao. "Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing". International Journal of Embedded Systems 11, n.º 6 (2019): 707. http://dx.doi.org/10.1504/ijes.2019.103984.
Texto completoGe, Xinrui, Jia Yu, Chengyu Hu, Hanlin Zhang y Rong Hao. "Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing". IEEE Access 6 (2018): 45725–39. http://dx.doi.org/10.1109/access.2018.2866031.
Texto completoYang, Changsong, Yueling Liu, Xiaoling Tao y Feng Zhao. "Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing". IEEE Access 8 (2020): 99393–403. http://dx.doi.org/10.1109/access.2020.2997351.
Texto completoWang, Jianfeng, Xiaofeng Chen, Jin Li, Jiaolian Zhao y Jian Shen. "Towards achieving flexible and verifiable search for outsourced database in cloud computing". Future Generation Computer Systems 67 (febrero de 2017): 266–75. http://dx.doi.org/10.1016/j.future.2016.05.002.
Texto completoWang, Qiang, Fucai Zhou, Jian Xu y Zifeng Xu. "Efficient verifiable databases with additional insertion and deletion operations in cloud computing". Future Generation Computer Systems 115 (febrero de 2021): 553–67. http://dx.doi.org/10.1016/j.future.2020.09.028.
Texto completoLong, Weifeng, Jiwen Zeng, Yaying Wu, Yan Gao y Hui Zhang. "A Certificateless Verifiable Bilinear Pair-Free Conjunctive Keyword Search Encryption Scheme for IoMT". Electronics 13, n.º 8 (11 de abril de 2024): 1449. http://dx.doi.org/10.3390/electronics13081449.
Texto completoAnju, Shaik Sumi, BSN Sravani y Srinivasa Rao Madala. "Publicly Verifiable Vibrant Digital Medical Information Systems". Journal of Physics: Conference Series 2089, n.º 1 (1 de noviembre de 2021): 012074. http://dx.doi.org/10.1088/1742-6596/2089/1/012074.
Texto completoDuan, Gangqiang y Shuai Li. "Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem". Electronics 12, n.º 18 (20 de septiembre de 2023): 3965. http://dx.doi.org/10.3390/electronics12183965.
Texto completoZhang, Bingxue, Guangguang Lu, Pengpeng Qiu, Xumin Gui y Yang Shi. "Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption". Entropy 25, n.º 11 (16 de noviembre de 2023): 1550. http://dx.doi.org/10.3390/e25111550.
Texto completo