4.6 Article

Multi-matrix verifiable computation

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Attribute-based multi-function verifiable computation

Ying Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Compressive Traffic Monitoring in Hybrid SDN

Tracy Yingying Cheng et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Computer Science, Theory & Methods

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Cloud Computing Service: The Case of Large Matrix Determinant Computation

Xinyu Lei et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Proceedings Paper Computer Science, Theory & Methods

Leveled Fully Homomorphic Signatures from Standard Lattices

Sergey Gorbunov et al.

STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING (2015)

Proceedings Paper Computer Science, Theory & Methods

ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data

Michael Backes et al.

2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)

Proceedings Paper Computer Science, Software Engineering

Verifying computations with state

Benjamin Braun et al.

SOSP'13: PROCEEDINGS OF THE TWENTY-FOURTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (2013)

Article Computer Science, Information Systems

Software architecture definition for on-demand cloud provisioning

Clovis Chapman et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2012)

Article Computer Science, Information Systems

Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms

Mehdi Mohammadi et al.

INFORMATION SCIENCES (2012)

Article Computer Science, Information Systems

A chaos-based symmetric image encryption scheme using a bit-level permutation

Zhi-liang Zhu et al.

INFORMATION SCIENCES (2011)

Article Computer Science, Information Systems

A cost-benefit analysis of using cloud computing to extend the capacity of clusters

Marcos Dias de Assuncao et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2010)

Article Computer Science, Theory & Methods

Image Encryption With Multiorders of Fractional Fourier Transforms

Ran Tao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Proceedings Paper Computer Science, Theory & Methods

Homomorphic MACs: MAC-Based Integrity for Network Coding

Shweta Agrawal et al.

APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (2009)

Article Computer Science, Theory & Methods

Oblivious polynomial evaluation

M Naor et al.

SIAM JOURNAL ON COMPUTING (2006)