Добірка наукової літератури з теми "Secure Outsourced Computation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure Outsourced Computation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secure Outsourced Computation"
Olakanmi, Oladayo Olufemi, and Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms." International Journal of Cloud Applications and Computing 9, no. 2 (April 2019): 79–98. http://dx.doi.org/10.4018/ijcac.2019040105.
Повний текст джерелаBlanton, Marina, and Mehrdad Aliasgari. "Secure outsourced computation of iris matching." Journal of Computer Security 20, no. 2-3 (June 12, 2012): 259–305. http://dx.doi.org/10.3233/jcs-2012-0447.
Повний текст джерелаSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin, and Wenmin Li. "Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/413265.
Повний текст джерелаShao, Jun, and Guiyi Wei. "Secure Outsourced Computation in Connected Vehicular Cloud Computing." IEEE Network 32, no. 3 (May 2018): 36–41. http://dx.doi.org/10.1109/mnet.2018.1700345.
Повний текст джерелаTreiber, Amos, Andreas Nautsch, Jascha Kolberg, Thomas Schneider, and Christoph Busch. "Privacy-preserving PLDA speaker verification using outsourced secure computation." Speech Communication 114 (November 2019): 60–71. http://dx.doi.org/10.1016/j.specom.2019.09.004.
Повний текст джерелаYang, Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, and Victor Chang. "A Comprehensive Survey on Secure Outsourced Computation and Its Applications." IEEE Access 7 (2019): 159426–65. http://dx.doi.org/10.1109/access.2019.2949782.
Повний текст джерелаHong, Jun, Tao Wen, Quan Guo, and Zhengwang Ye. "Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud." Mathematical Problems in Engineering 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/8109730.
Повний текст джерелаYang, Guangcan, Jiayang Li, Yunhua He, Ke Xiao, Yang Xin, Hongliang Zhu, and Chen Li. "A Security-Enhanced Query Result Verification Scheme for Outsourced Data in Location-Based Services." Applied Sciences 12, no. 16 (August 13, 2022): 8126. http://dx.doi.org/10.3390/app12168126.
Повний текст джерелаZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu, and Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Повний текст джерелаSong, Mingyang, and Yingpeng Sang. "Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud." Sensors 21, no. 20 (October 14, 2021): 6821. http://dx.doi.org/10.3390/s21206821.
Повний текст джерелаДисертації з теми "Secure Outsourced Computation"
Wang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems." UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Повний текст джерелаSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Повний текст джерелаPh. D.
Papadopoulos, Dimitrios. "Function-specific schemes for verifiable computation." Thesis, 2016. https://hdl.handle.net/2144/19746.
Повний текст джерелаAjith, S. "MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning." Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5543.
Повний текст джерелаЧастини книг з теми "Secure Outsourced Computation"
Loftus, Jake, and Nigel P. Smart. "Secure Outsourced Computation." In Lecture Notes in Computer Science, 1–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21969-6_1.
Повний текст джерелаHyla, Tomasz, and Jerzy Pejaś. "Secure Outsourced Bilinear Pairings Computation for Mobile Devices." In Network and System Security, 519–29. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_34.
Повний текст джерелаHacıgümüş, Hakan, Bala Iyer, and Sharad Mehrotra. "Secure Computation on Outsourced Data: A 10-year Retrospective." In Database Systems for Advanced Applications, 16–27. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05810-8_2.
Повний текст джерелаZhang, Xin, Chao Shan, and Yunfeng Zou. "Multi-party Secure Comparison of Strings Based on Outsourced Computation." In Machine Learning for Cyber Security, 15–30. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20099-1_2.
Повний текст джерелаThangam, V., and K. Chandrasekaran. "Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment." In Communications in Computer and Information Science, 199–212. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2738-3_17.
Повний текст джерелаThießen, Thore, and Jan Vahrenhold. "Klee’s Measure Problem Made Oblivious." In LATIN 2022: Theoretical Informatics, 121–38. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-20624-5_8.
Повний текст джерелаDang, Hung, Dat Le Tien, and Ee-Chien Chang. "Towards a Marketplace for Secure Outsourced Computations." In Lecture Notes in Computer Science, 790–808. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29959-0_38.
Повний текст джерелаHohenberger, Susan, and Anna Lysyanskaya. "How to Securely Outsource Cryptographic Computations." In Theory of Cryptography, 264–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30576-7_15.
Повний текст джерелаZhao, Liang. "Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation." In Topics in Cryptology – CT-RSA 2019, 514–34. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12612-4_26.
Повний текст джерелаZhang, Jiuling, Shijun Shen, and Daochao Huang. "A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing." In Communications in Computer and Information Science, 29–36. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_3.
Повний текст джерелаТези доповідей конференцій з теми "Secure Outsourced Computation"
Cao, Chenglong, and Xiaoling Zhu. "Secure and Verifiable Outsourced Computation Based on Blockchain." In 2023 4th Information Communication Technologies Conference (ICTC). IEEE, 2023. http://dx.doi.org/10.1109/ictc57116.2023.10154879.
Повний текст джерелаJiang, Xiaoqian, Miran Kim, Kristin Lauter, and Yongsoo Song. "Secure Outsourced Matrix Computation and Application to Neural Networks." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3243734.3243837.
Повний текст джерелаRong, Hong, Huimei Wang, Jian Liu, Wei Wu, and Ming Xian. "Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments." In 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0069.
Повний текст джерелаGuo, Shu, and Haixia Xu. "A Non-interactive Secure Outsourced Computation Scheme in Multi-party Cloud." In 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2012. http://dx.doi.org/10.1109/incos.2012.50.
Повний текст джерелаChen, Huajie, Ali Burak Ünal, Mete Akgün, and Nico Pfeifer. "Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation." In CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3375708.3380316.
Повний текст джерелаWang, Zhaohong, and Jing Guo. "Denoising Signals on the Graph for Distributed Systems by Secure Outsourced Computation." In 2021 IEEE 7th World Forum on Internet of Things (WF-IoT). IEEE, 2021. http://dx.doi.org/10.1109/wf-iot51360.2021.9595245.
Повний текст джерелаKrol, Michal, and Ioannis Psaras. "SPOC: Secure Payments for Outsourced Computations." In Workshop on Decentralized IoT Security and Standards. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/diss.2018.23002.
Повний текст джерелаCachin, Christian. "Session details: Session 8A -- Secure Outsourced Computations." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/3255164.
Повний текст джерелаLi, Yaohang, Ravi Mukkamala, and Michael Mascagni. "Validating the Correctness of Outsourced Computational Tasks Using Pseudorandom Number Generators." In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.81.
Повний текст джерела