Artigos de revistas sobre o tema "Verifiable computing"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Verifiable computing".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Simunic, Silvio, Dalen Bernaca e Kristijan Lenac. "Verifiable Computing Applications in Blockchain". IEEE Access 9 (2021): 156729–45. http://dx.doi.org/10.1109/access.2021.3129314.
Texto completo da fonteYan, Zheng, Xixun Yu e Wenxiu Ding. "Context-Aware Verifiable Cloud Computing". IEEE Access 5 (2017): 2211–27. http://dx.doi.org/10.1109/access.2017.2666839.
Texto completo da fonteSong, Beibei, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu e Chuansheng Wang. "Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions". Future Internet 15, n.º 4 (21 de abril de 2023): 152. http://dx.doi.org/10.3390/fi15040152.
Texto completo da fonteSun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu e Qianhong Wu. "Confidentiality-Preserving Publicly Verifiable Computation". International Journal of Foundations of Computer Science 28, n.º 06 (setembro de 2017): 799–818. http://dx.doi.org/10.1142/s0129054117400196.
Texto completo da fonteYao, Shuang, e Dawei Zhang. "An Anonymous Verifiable Random Function with Applications in Blockchain". Wireless Communications and Mobile Computing 2022 (19 de abril de 2022): 1–12. http://dx.doi.org/10.1155/2022/6467866.
Texto completo da fonteJiao, Zi, Fucai Zhou, Qiang Wang e Jintong Sun. "RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing". Sensors 22, n.º 11 (25 de maio de 2022): 4012. http://dx.doi.org/10.3390/s22114012.
Texto completo da fonteWang, Jianfeng, Xiaofeng Chen, Xinyi Huang, Ilsun You e Yang Xiang. "Verifiable Auditing for Outsourced Database in Cloud Computing". IEEE Transactions on Computers 64, n.º 11 (1 de novembro de 2015): 3293–303. http://dx.doi.org/10.1109/tc.2015.2401036.
Texto completo da fonteXu, Lingling, e Shaohua Tang. "Verifiable computation with access control in cloud computing". Journal of Supercomputing 69, n.º 2 (29 de outubro de 2013): 528–46. http://dx.doi.org/10.1007/s11227-013-1039-z.
Texto completo da fonteZhang, Kai, Lifei Wei, Xiangxue Li e Haifeng Qian. "Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing". Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/6128437.
Texto completo da fonteGheorghiu, Alexandru, Elham Kashefi e Petros Wallden. "Robustness and device independence of verifiable blind quantum computing". New Journal of Physics 17, n.º 8 (19 de agosto de 2015): 083040. http://dx.doi.org/10.1088/1367-2630/17/8/083040.
Texto completo da fonteZhu, Yixiao, Hui Li, Jiangtao Cui e Yong Ma. "Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing". IEEE Access 7 (2019): 169636–45. http://dx.doi.org/10.1109/access.2019.2955243.
Texto completo da fonteAusekar, Swapnil Ramesh, e Syam Kumar Pasupuleti. "Dynamic Verifiable Outsourced Database with Freshness in Cloud Computing". Procedia Computer Science 143 (2018): 367–77. http://dx.doi.org/10.1016/j.procs.2018.10.408.
Texto completo da fonteSu, Yaping, Jianfeng Wang, Yunling Wang e Meixia Miao. "Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing". IEEE Access 7 (2019): 141352–62. http://dx.doi.org/10.1109/access.2019.2943971.
Texto completo da fonteXu, Qingshan, Xiaoqing Tan e Rui Huang. "Improved Resource State for Verifiable Blind Quantum Computation". Entropy 22, n.º 9 (7 de setembro de 2020): 996. http://dx.doi.org/10.3390/e22090996.
Texto completo da fonteEL-YAHYAOUI, Ahmed, e Mohamed Dafir ECH-CHERIF EL KETTANI. "A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security". Technologies 7, n.º 1 (6 de fevereiro de 2019): 21. http://dx.doi.org/10.3390/technologies7010021.
Texto completo da fontewu, Junhua, Wenzhen Feng, Guopeng Liang, Tiantian Wang, Guangshun Li e Yuanwang Zheng. "A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing". Security and Communication Networks 2022 (10 de março de 2022): 1–12. http://dx.doi.org/10.1155/2022/4095427.
Texto completo da fonteFu, Moxuan, Chuan Zhang, Chenfei Hu, Tong Wu, Jinyang Dong e Liehuang Zhu. "Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains". Entropy 25, n.º 7 (13 de julho de 2023): 1058. http://dx.doi.org/10.3390/e25071058.
Texto completo da fonteLi, Cheng, Li Yang e Jianfeng Ma. "A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model". Wireless Communications and Mobile Computing 2020 (17 de novembro de 2020): 1–16. http://dx.doi.org/10.1155/2020/8825623.
Texto completo da fonteNiu, Kun, Changgen Peng, Weijie Tan, Zhou Zhou e Yi Xu. "Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing". Security and Communication Networks 2021 (28 de abril de 2021): 1–11. http://dx.doi.org/10.1155/2021/6654539.
Texto completo da fonteZhu, Yixiao, Wenjie Ma, Jiangtao Cui, Xiaofang Xia, Yanguo Peng e Jianting Ning. "PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing". Security and Communication Networks 2021 (28 de maio de 2021): 1–18. http://dx.doi.org/10.1155/2021/5514137.
Texto completo da fonteRuiting, SHAN, CHEN Xiubo, XU Gang, DOU Zhao, LI Zongpeng, MIAO Lihua e YANG Yixian. "Verifiable Multi‐Party Universal Blind Quantum Computing in Distributed Networks". Chinese Journal of Electronics 30, n.º 4 (julho de 2021): 712–18. http://dx.doi.org/10.1049/cje.2021.05.013.
Texto completo da fonteShen, Jian, Dengzhi Liu, Md Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun e Aniello Castiglione. "Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing". IEEE Transactions on Emerging Topics in Computing 8, n.º 2 (1 de abril de 2020): 280–90. http://dx.doi.org/10.1109/tetc.2017.2776402.
Texto completo da fontePremnath, Sriram N., e Zygmunt J. Haas. "A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems". Procedia Computer Science 34 (2014): 474–83. http://dx.doi.org/10.1016/j.procs.2014.07.033.
Texto completo da fonteWang, Hao, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao e Minghao Zhao. "Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing". Soft Computing 21, n.º 24 (13 de julho de 2016): 7325–35. http://dx.doi.org/10.1007/s00500-016-2271-2.
Texto completo da fonteLi, Jianwei, Xiaoming Wang e Qingqing Gan. "Verifiable Data Search with Fine-Grained Authorization in Edge Computing". Security and Communication Networks 2022 (10 de novembro de 2022): 1–15. http://dx.doi.org/10.1155/2022/4252466.
Texto completo da fonteS, Aswin, Chandru V, Mathan Raj e K. Ashok Kumar. "Secure Date Storage Using ECC Encryption with Verifiable Data Sharing in Cloud". International Research Journal of Computer Science 11, n.º 04 (5 de abril de 2024): 230–33. http://dx.doi.org/10.26562/irjcs.2024.v1104.16.
Texto completo da fonteZhang, Tao, Xiongfei Song, Lele Zheng, Yani Han, Kai Zhang e Qi Li. "Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing". Security and Communication Networks 2021 (22 de janeiro de 2021): 1–14. http://dx.doi.org/10.1155/2021/6679157.
Texto completo da fonteG, Kulkarni Vaibhav. "Secure Integrity Auditing System for Electronic Patient Health Records using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 10, n.º 1 (31 de janeiro de 2022): 1536–38. http://dx.doi.org/10.22214/ijraset.2022.40089.
Texto completo da fonteWang, Jianfeng, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma e Xiaofeng Chen. "Efficient verifiable fuzzy keyword search over encrypted data in cloud computing". Computer Science and Information Systems 10, n.º 2 (2013): 667–84. http://dx.doi.org/10.2298/csis121104028w.
Texto completo da fonteChang, Ya-Fen. "Flexible Access Control over Verifiable Cloud Computing Services with Provable Security". Informatica 26, n.º 2 (1 de janeiro de 2015): 181–98. http://dx.doi.org/10.15388/informatica.2015.44.
Texto completo da fontePark, Ki-Woong, Jaesun Han, JaeWoong Chung e Kyu Ho Park. "THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment". IEEE Transactions on Services Computing 6, n.º 3 (julho de 2013): 300–313. http://dx.doi.org/10.1109/tsc.2012.1.
Texto completo da fonteZhang, Xiaoyu, Xiaofeng Chen, Jianfeng Wang, Zhihui Zhan e Jin Li. "Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing". Soft Computing 22, n.º 23 (16 de maio de 2018): 7719–32. http://dx.doi.org/10.1007/s00500-018-3233-7.
Texto completo da fonteMohammed, Nedal, Laman R. Sultan e Santosh Lomte. "Privacy preserving outsourcing algorithm for two-point linear boundary value problems". Indonesian Journal of Electrical Engineering and Computer Science 16, n.º 2 (1 de novembro de 2019): 1065. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp1065-1069.
Texto completo da fonteKaremallaiah, Jayalakshmi, e Prabha Revaiah. "Verifiable data distribution technique for multiple applicants in a cloud computing ecosystem". IAES International Journal of Artificial Intelligence (IJ-AI) 13, n.º 2 (1 de junho de 2024): 1241. http://dx.doi.org/10.11591/ijai.v13.i2.pp1241-1249.
Texto completo da fonteWu, Hongfeng, e Jingjing Yan. "Outsourcing Computing of Large Matrix Jordan Decomposition". Mathematical Problems in Engineering 2019 (19 de agosto de 2019): 1–7. http://dx.doi.org/10.1155/2019/6410626.
Texto completo da fonteEl-Yahyaoui, Ahmed, e Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques". International Journal of Embedded and Real-Time Communication Systems 10, n.º 3 (julho de 2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Texto completo da fonteTang, Yongli, Minglu Jin, Hui Meng, Li Yang e Chengfu Zheng. "Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme". Entropy 25, n.º 5 (19 de maio de 2023): 822. http://dx.doi.org/10.3390/e25050822.
Texto completo da fonteCao, Laicheng, Wenwen He, Xian Guo e Tao Feng. "A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment". Mathematical Problems in Engineering 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/9267608.
Texto completo da fonteFan, Kai, Junxiong Wang, Xin Wang, Hui Li e Yintang Yang. "A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing". Sensors 17, n.º 7 (24 de julho de 2017): 1695. http://dx.doi.org/10.3390/s17071695.
Texto completo da fonteZhou, Kai, M. H. Afifi e Jian Ren. "ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing". IEEE Transactions on Information Forensics and Security 12, n.º 11 (novembro de 2017): 2518–31. http://dx.doi.org/10.1109/tifs.2017.2710941.
Texto completo da fonteTao, Xiaoling, Kai Nie e Yunling Wang. "Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing". International Journal of Embedded Systems 11, n.º 6 (2019): 707. http://dx.doi.org/10.1504/ijes.2019.10025616.
Texto completo da fonteNie, Kai, Yunling Wang e Xiaoling Tao. "Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing". International Journal of Embedded Systems 11, n.º 6 (2019): 707. http://dx.doi.org/10.1504/ijes.2019.103984.
Texto completo da fonteGe, Xinrui, Jia Yu, Chengyu Hu, Hanlin Zhang e Rong Hao. "Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing". IEEE Access 6 (2018): 45725–39. http://dx.doi.org/10.1109/access.2018.2866031.
Texto completo da fonteYang, Changsong, Yueling Liu, Xiaoling Tao e Feng Zhao. "Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing". IEEE Access 8 (2020): 99393–403. http://dx.doi.org/10.1109/access.2020.2997351.
Texto completo da fonteWang, Jianfeng, Xiaofeng Chen, Jin Li, Jiaolian Zhao e Jian Shen. "Towards achieving flexible and verifiable search for outsourced database in cloud computing". Future Generation Computer Systems 67 (fevereiro de 2017): 266–75. http://dx.doi.org/10.1016/j.future.2016.05.002.
Texto completo da fonteWang, Qiang, Fucai Zhou, Jian Xu e Zifeng Xu. "Efficient verifiable databases with additional insertion and deletion operations in cloud computing". Future Generation Computer Systems 115 (fevereiro de 2021): 553–67. http://dx.doi.org/10.1016/j.future.2020.09.028.
Texto completo da fonteLong, Weifeng, Jiwen Zeng, Yaying Wu, Yan Gao e Hui Zhang. "A Certificateless Verifiable Bilinear Pair-Free Conjunctive Keyword Search Encryption Scheme for IoMT". Electronics 13, n.º 8 (11 de abril de 2024): 1449. http://dx.doi.org/10.3390/electronics13081449.
Texto completo da fonteAnju, Shaik Sumi, BSN Sravani e Srinivasa Rao Madala. "Publicly Verifiable Vibrant Digital Medical Information Systems". Journal of Physics: Conference Series 2089, n.º 1 (1 de novembro de 2021): 012074. http://dx.doi.org/10.1088/1742-6596/2089/1/012074.
Texto completo da fonteDuan, Gangqiang, e Shuai Li. "Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem". Electronics 12, n.º 18 (20 de setembro de 2023): 3965. http://dx.doi.org/10.3390/electronics12183965.
Texto completo da fonteZhang, Bingxue, Guangguang Lu, Pengpeng Qiu, Xumin Gui e Yang Shi. "Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption". Entropy 25, n.º 11 (16 de novembro de 2023): 1550. http://dx.doi.org/10.3390/e25111550.
Texto completo da fonte