Artykuły w czasopismach na temat „Verifiable computing”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Verifiable computing”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Simunic, Silvio, Dalen Bernaca i Kristijan Lenac. "Verifiable Computing Applications in Blockchain". IEEE Access 9 (2021): 156729–45. http://dx.doi.org/10.1109/access.2021.3129314.
Pełny tekst źródłaYan, Zheng, Xixun Yu i Wenxiu Ding. "Context-Aware Verifiable Cloud Computing". IEEE Access 5 (2017): 2211–27. http://dx.doi.org/10.1109/access.2017.2666839.
Pełny tekst źródłaSong, Beibei, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu i Chuansheng Wang. "Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions". Future Internet 15, nr 4 (21.04.2023): 152. http://dx.doi.org/10.3390/fi15040152.
Pełny tekst źródłaSun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu i Qianhong Wu. "Confidentiality-Preserving Publicly Verifiable Computation". International Journal of Foundations of Computer Science 28, nr 06 (wrzesień 2017): 799–818. http://dx.doi.org/10.1142/s0129054117400196.
Pełny tekst źródłaYao, Shuang, i Dawei Zhang. "An Anonymous Verifiable Random Function with Applications in Blockchain". Wireless Communications and Mobile Computing 2022 (19.04.2022): 1–12. http://dx.doi.org/10.1155/2022/6467866.
Pełny tekst źródłaJiao, Zi, Fucai Zhou, Qiang Wang i Jintong Sun. "RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing". Sensors 22, nr 11 (25.05.2022): 4012. http://dx.doi.org/10.3390/s22114012.
Pełny tekst źródłaWang, Jianfeng, Xiaofeng Chen, Xinyi Huang, Ilsun You i Yang Xiang. "Verifiable Auditing for Outsourced Database in Cloud Computing". IEEE Transactions on Computers 64, nr 11 (1.11.2015): 3293–303. http://dx.doi.org/10.1109/tc.2015.2401036.
Pełny tekst źródłaXu, Lingling, i Shaohua Tang. "Verifiable computation with access control in cloud computing". Journal of Supercomputing 69, nr 2 (29.10.2013): 528–46. http://dx.doi.org/10.1007/s11227-013-1039-z.
Pełny tekst źródłaZhang, Kai, Lifei Wei, Xiangxue Li i Haifeng Qian. "Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing". Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/6128437.
Pełny tekst źródłaGheorghiu, Alexandru, Elham Kashefi i Petros Wallden. "Robustness and device independence of verifiable blind quantum computing". New Journal of Physics 17, nr 8 (19.08.2015): 083040. http://dx.doi.org/10.1088/1367-2630/17/8/083040.
Pełny tekst źródłaZhu, Yixiao, Hui Li, Jiangtao Cui i Yong Ma. "Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing". IEEE Access 7 (2019): 169636–45. http://dx.doi.org/10.1109/access.2019.2955243.
Pełny tekst źródłaAusekar, Swapnil Ramesh, i Syam Kumar Pasupuleti. "Dynamic Verifiable Outsourced Database with Freshness in Cloud Computing". Procedia Computer Science 143 (2018): 367–77. http://dx.doi.org/10.1016/j.procs.2018.10.408.
Pełny tekst źródłaSu, Yaping, Jianfeng Wang, Yunling Wang i Meixia Miao. "Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing". IEEE Access 7 (2019): 141352–62. http://dx.doi.org/10.1109/access.2019.2943971.
Pełny tekst źródłaXu, Qingshan, Xiaoqing Tan i Rui Huang. "Improved Resource State for Verifiable Blind Quantum Computation". Entropy 22, nr 9 (7.09.2020): 996. http://dx.doi.org/10.3390/e22090996.
Pełny tekst źródłaEL-YAHYAOUI, Ahmed, i Mohamed Dafir ECH-CHERIF EL KETTANI. "A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security". Technologies 7, nr 1 (6.02.2019): 21. http://dx.doi.org/10.3390/technologies7010021.
Pełny tekst źródławu, Junhua, Wenzhen Feng, Guopeng Liang, Tiantian Wang, Guangshun Li i Yuanwang Zheng. "A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing". Security and Communication Networks 2022 (10.03.2022): 1–12. http://dx.doi.org/10.1155/2022/4095427.
Pełny tekst źródłaFu, Moxuan, Chuan Zhang, Chenfei Hu, Tong Wu, Jinyang Dong i Liehuang Zhu. "Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains". Entropy 25, nr 7 (13.07.2023): 1058. http://dx.doi.org/10.3390/e25071058.
Pełny tekst źródłaLi, Cheng, Li Yang i Jianfeng Ma. "A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model". Wireless Communications and Mobile Computing 2020 (17.11.2020): 1–16. http://dx.doi.org/10.1155/2020/8825623.
Pełny tekst źródłaNiu, Kun, Changgen Peng, Weijie Tan, Zhou Zhou i Yi Xu. "Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing". Security and Communication Networks 2021 (28.04.2021): 1–11. http://dx.doi.org/10.1155/2021/6654539.
Pełny tekst źródłaZhu, Yixiao, Wenjie Ma, Jiangtao Cui, Xiaofang Xia, Yanguo Peng i Jianting Ning. "PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing". Security and Communication Networks 2021 (28.05.2021): 1–18. http://dx.doi.org/10.1155/2021/5514137.
Pełny tekst źródłaRuiting, SHAN, CHEN Xiubo, XU Gang, DOU Zhao, LI Zongpeng, MIAO Lihua i YANG Yixian. "Verifiable Multi‐Party Universal Blind Quantum Computing in Distributed Networks". Chinese Journal of Electronics 30, nr 4 (lipiec 2021): 712–18. http://dx.doi.org/10.1049/cje.2021.05.013.
Pełny tekst źródłaShen, Jian, Dengzhi Liu, Md Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun i Aniello Castiglione. "Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing". IEEE Transactions on Emerging Topics in Computing 8, nr 2 (1.04.2020): 280–90. http://dx.doi.org/10.1109/tetc.2017.2776402.
Pełny tekst źródłaPremnath, Sriram N., i Zygmunt J. Haas. "A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems". Procedia Computer Science 34 (2014): 474–83. http://dx.doi.org/10.1016/j.procs.2014.07.033.
Pełny tekst źródłaWang, Hao, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao i Minghao Zhao. "Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing". Soft Computing 21, nr 24 (13.07.2016): 7325–35. http://dx.doi.org/10.1007/s00500-016-2271-2.
Pełny tekst źródłaLi, Jianwei, Xiaoming Wang i Qingqing Gan. "Verifiable Data Search with Fine-Grained Authorization in Edge Computing". Security and Communication Networks 2022 (10.11.2022): 1–15. http://dx.doi.org/10.1155/2022/4252466.
Pełny tekst źródłaS, Aswin, Chandru V, Mathan Raj i K. Ashok Kumar. "Secure Date Storage Using ECC Encryption with Verifiable Data Sharing in Cloud". International Research Journal of Computer Science 11, nr 04 (5.04.2024): 230–33. http://dx.doi.org/10.26562/irjcs.2024.v1104.16.
Pełny tekst źródłaZhang, Tao, Xiongfei Song, Lele Zheng, Yani Han, Kai Zhang i Qi Li. "Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing". Security and Communication Networks 2021 (22.01.2021): 1–14. http://dx.doi.org/10.1155/2021/6679157.
Pełny tekst źródłaG, Kulkarni Vaibhav. "Secure Integrity Auditing System for Electronic Patient Health Records using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 10, nr 1 (31.01.2022): 1536–38. http://dx.doi.org/10.22214/ijraset.2022.40089.
Pełny tekst źródłaWang, Jianfeng, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma i Xiaofeng Chen. "Efficient verifiable fuzzy keyword search over encrypted data in cloud computing". Computer Science and Information Systems 10, nr 2 (2013): 667–84. http://dx.doi.org/10.2298/csis121104028w.
Pełny tekst źródłaChang, Ya-Fen. "Flexible Access Control over Verifiable Cloud Computing Services with Provable Security". Informatica 26, nr 2 (1.01.2015): 181–98. http://dx.doi.org/10.15388/informatica.2015.44.
Pełny tekst źródłaPark, Ki-Woong, Jaesun Han, JaeWoong Chung i Kyu Ho Park. "THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment". IEEE Transactions on Services Computing 6, nr 3 (lipiec 2013): 300–313. http://dx.doi.org/10.1109/tsc.2012.1.
Pełny tekst źródłaZhang, Xiaoyu, Xiaofeng Chen, Jianfeng Wang, Zhihui Zhan i Jin Li. "Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing". Soft Computing 22, nr 23 (16.05.2018): 7719–32. http://dx.doi.org/10.1007/s00500-018-3233-7.
Pełny tekst źródłaMohammed, Nedal, Laman R. Sultan i Santosh Lomte. "Privacy preserving outsourcing algorithm for two-point linear boundary value problems". Indonesian Journal of Electrical Engineering and Computer Science 16, nr 2 (1.11.2019): 1065. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp1065-1069.
Pełny tekst źródłaKaremallaiah, Jayalakshmi, i Prabha Revaiah. "Verifiable data distribution technique for multiple applicants in a cloud computing ecosystem". IAES International Journal of Artificial Intelligence (IJ-AI) 13, nr 2 (1.06.2024): 1241. http://dx.doi.org/10.11591/ijai.v13.i2.pp1241-1249.
Pełny tekst źródłaWu, Hongfeng, i Jingjing Yan. "Outsourcing Computing of Large Matrix Jordan Decomposition". Mathematical Problems in Engineering 2019 (19.08.2019): 1–7. http://dx.doi.org/10.1155/2019/6410626.
Pełny tekst źródłaEl-Yahyaoui, Ahmed, i Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques". International Journal of Embedded and Real-Time Communication Systems 10, nr 3 (lipiec 2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Pełny tekst źródłaTang, Yongli, Minglu Jin, Hui Meng, Li Yang i Chengfu Zheng. "Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme". Entropy 25, nr 5 (19.05.2023): 822. http://dx.doi.org/10.3390/e25050822.
Pełny tekst źródłaCao, Laicheng, Wenwen He, Xian Guo i Tao Feng. "A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment". Mathematical Problems in Engineering 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/9267608.
Pełny tekst źródłaFan, Kai, Junxiong Wang, Xin Wang, Hui Li i Yintang Yang. "A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing". Sensors 17, nr 7 (24.07.2017): 1695. http://dx.doi.org/10.3390/s17071695.
Pełny tekst źródłaZhou, Kai, M. H. Afifi i Jian Ren. "ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing". IEEE Transactions on Information Forensics and Security 12, nr 11 (listopad 2017): 2518–31. http://dx.doi.org/10.1109/tifs.2017.2710941.
Pełny tekst źródłaTao, Xiaoling, Kai Nie i Yunling Wang. "Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing". International Journal of Embedded Systems 11, nr 6 (2019): 707. http://dx.doi.org/10.1504/ijes.2019.10025616.
Pełny tekst źródłaNie, Kai, Yunling Wang i Xiaoling Tao. "Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing". International Journal of Embedded Systems 11, nr 6 (2019): 707. http://dx.doi.org/10.1504/ijes.2019.103984.
Pełny tekst źródłaGe, Xinrui, Jia Yu, Chengyu Hu, Hanlin Zhang i Rong Hao. "Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing". IEEE Access 6 (2018): 45725–39. http://dx.doi.org/10.1109/access.2018.2866031.
Pełny tekst źródłaYang, Changsong, Yueling Liu, Xiaoling Tao i Feng Zhao. "Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing". IEEE Access 8 (2020): 99393–403. http://dx.doi.org/10.1109/access.2020.2997351.
Pełny tekst źródłaWang, Jianfeng, Xiaofeng Chen, Jin Li, Jiaolian Zhao i Jian Shen. "Towards achieving flexible and verifiable search for outsourced database in cloud computing". Future Generation Computer Systems 67 (luty 2017): 266–75. http://dx.doi.org/10.1016/j.future.2016.05.002.
Pełny tekst źródłaWang, Qiang, Fucai Zhou, Jian Xu i Zifeng Xu. "Efficient verifiable databases with additional insertion and deletion operations in cloud computing". Future Generation Computer Systems 115 (luty 2021): 553–67. http://dx.doi.org/10.1016/j.future.2020.09.028.
Pełny tekst źródłaLong, Weifeng, Jiwen Zeng, Yaying Wu, Yan Gao i Hui Zhang. "A Certificateless Verifiable Bilinear Pair-Free Conjunctive Keyword Search Encryption Scheme for IoMT". Electronics 13, nr 8 (11.04.2024): 1449. http://dx.doi.org/10.3390/electronics13081449.
Pełny tekst źródłaAnju, Shaik Sumi, BSN Sravani i Srinivasa Rao Madala. "Publicly Verifiable Vibrant Digital Medical Information Systems". Journal of Physics: Conference Series 2089, nr 1 (1.11.2021): 012074. http://dx.doi.org/10.1088/1742-6596/2089/1/012074.
Pełny tekst źródłaDuan, Gangqiang, i Shuai Li. "Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem". Electronics 12, nr 18 (20.09.2023): 3965. http://dx.doi.org/10.3390/electronics12183965.
Pełny tekst źródłaZhang, Bingxue, Guangguang Lu, Pengpeng Qiu, Xumin Gui i Yang Shi. "Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption". Entropy 25, nr 11 (16.11.2023): 1550. http://dx.doi.org/10.3390/e25111550.
Pełny tekst źródła