Gotowa bibliografia na temat „Secure Outsourced Computation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Secure Outsourced Computation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Secure Outsourced Computation"
Olakanmi, Oladayo Olufemi, i Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms". International Journal of Cloud Applications and Computing 9, nr 2 (kwiecień 2019): 79–98. http://dx.doi.org/10.4018/ijcac.2019040105.
Pełny tekst źródłaBlanton, Marina, i Mehrdad Aliasgari. "Secure outsourced computation of iris matching". Journal of Computer Security 20, nr 2-3 (12.06.2012): 259–305. http://dx.doi.org/10.3233/jcs-2012-0447.
Pełny tekst źródłaSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin i Wenmin Li. "Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/413265.
Pełny tekst źródłaShao, Jun, i Guiyi Wei. "Secure Outsourced Computation in Connected Vehicular Cloud Computing". IEEE Network 32, nr 3 (maj 2018): 36–41. http://dx.doi.org/10.1109/mnet.2018.1700345.
Pełny tekst źródłaTreiber, Amos, Andreas Nautsch, Jascha Kolberg, Thomas Schneider i Christoph Busch. "Privacy-preserving PLDA speaker verification using outsourced secure computation". Speech Communication 114 (listopad 2019): 60–71. http://dx.doi.org/10.1016/j.specom.2019.09.004.
Pełny tekst źródłaYang, Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo i Victor Chang. "A Comprehensive Survey on Secure Outsourced Computation and Its Applications". IEEE Access 7 (2019): 159426–65. http://dx.doi.org/10.1109/access.2019.2949782.
Pełny tekst źródłaHong, Jun, Tao Wen, Quan Guo i Zhengwang Ye. "Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud". Mathematical Problems in Engineering 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/8109730.
Pełny tekst źródłaYang, Guangcan, Jiayang Li, Yunhua He, Ke Xiao, Yang Xin, Hongliang Zhu i Chen Li. "A Security-Enhanced Query Result Verification Scheme for Outsourced Data in Location-Based Services". Applied Sciences 12, nr 16 (13.08.2022): 8126. http://dx.doi.org/10.3390/app12168126.
Pełny tekst źródłaZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu i Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud". International Journal of Foundations of Computer Science 28, nr 06 (wrzesień 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Pełny tekst źródłaSong, Mingyang, i Yingpeng Sang. "Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud". Sensors 21, nr 20 (14.10.2021): 6821. http://dx.doi.org/10.3390/s21206821.
Pełny tekst źródłaRozprawy doktorskie na temat "Secure Outsourced Computation"
Wang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems". UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Pełny tekst źródłaSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud". Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Pełny tekst źródłaPh. D.
Papadopoulos, Dimitrios. "Function-specific schemes for verifiable computation". Thesis, 2016. https://hdl.handle.net/2144/19746.
Pełny tekst źródłaAjith, S. "MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning". Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5543.
Pełny tekst źródłaCzęści książek na temat "Secure Outsourced Computation"
Loftus, Jake, i Nigel P. Smart. "Secure Outsourced Computation". W Lecture Notes in Computer Science, 1–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21969-6_1.
Pełny tekst źródłaHyla, Tomasz, i Jerzy Pejaś. "Secure Outsourced Bilinear Pairings Computation for Mobile Devices". W Network and System Security, 519–29. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_34.
Pełny tekst źródłaHacıgümüş, Hakan, Bala Iyer i Sharad Mehrotra. "Secure Computation on Outsourced Data: A 10-year Retrospective". W Database Systems for Advanced Applications, 16–27. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05810-8_2.
Pełny tekst źródłaZhang, Xin, Chao Shan i Yunfeng Zou. "Multi-party Secure Comparison of Strings Based on Outsourced Computation". W Machine Learning for Cyber Security, 15–30. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20099-1_2.
Pełny tekst źródłaThangam, V., i K. Chandrasekaran. "Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment". W Communications in Computer and Information Science, 199–212. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2738-3_17.
Pełny tekst źródłaThießen, Thore, i Jan Vahrenhold. "Klee’s Measure Problem Made Oblivious". W LATIN 2022: Theoretical Informatics, 121–38. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-20624-5_8.
Pełny tekst źródłaDang, Hung, Dat Le Tien i Ee-Chien Chang. "Towards a Marketplace for Secure Outsourced Computations". W Lecture Notes in Computer Science, 790–808. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29959-0_38.
Pełny tekst źródłaHohenberger, Susan, i Anna Lysyanskaya. "How to Securely Outsource Cryptographic Computations". W Theory of Cryptography, 264–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30576-7_15.
Pełny tekst źródłaZhao, Liang. "Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation". W Topics in Cryptology – CT-RSA 2019, 514–34. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12612-4_26.
Pełny tekst źródłaZhang, Jiuling, Shijun Shen i Daochao Huang. "A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing". W Communications in Computer and Information Science, 29–36. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_3.
Pełny tekst źródłaStreszczenia konferencji na temat "Secure Outsourced Computation"
Cao, Chenglong, i Xiaoling Zhu. "Secure and Verifiable Outsourced Computation Based on Blockchain". W 2023 4th Information Communication Technologies Conference (ICTC). IEEE, 2023. http://dx.doi.org/10.1109/ictc57116.2023.10154879.
Pełny tekst źródłaJiang, Xiaoqian, Miran Kim, Kristin Lauter i Yongsoo Song. "Secure Outsourced Matrix Computation and Application to Neural Networks". W CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3243734.3243837.
Pełny tekst źródłaRong, Hong, Huimei Wang, Jian Liu, Wei Wu i Ming Xian. "Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments". W 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0069.
Pełny tekst źródłaGuo, Shu, i Haixia Xu. "A Non-interactive Secure Outsourced Computation Scheme in Multi-party Cloud". W 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2012. http://dx.doi.org/10.1109/incos.2012.50.
Pełny tekst źródłaChen, Huajie, Ali Burak Ünal, Mete Akgün i Nico Pfeifer. "Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation". W CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3375708.3380316.
Pełny tekst źródłaWang, Zhaohong, i Jing Guo. "Denoising Signals on the Graph for Distributed Systems by Secure Outsourced Computation". W 2021 IEEE 7th World Forum on Internet of Things (WF-IoT). IEEE, 2021. http://dx.doi.org/10.1109/wf-iot51360.2021.9595245.
Pełny tekst źródłaKrol, Michal, i Ioannis Psaras. "SPOC: Secure Payments for Outsourced Computations". W Workshop on Decentralized IoT Security and Standards. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/diss.2018.23002.
Pełny tekst źródłaCachin, Christian. "Session details: Session 8A -- Secure Outsourced Computations". W CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/3255164.
Pełny tekst źródłaLi, Yaohang, Ravi Mukkamala i Michael Mascagni. "Validating the Correctness of Outsourced Computational Tasks Using Pseudorandom Number Generators". W 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.81.
Pełny tekst źródła