4.7 Article

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs

Pu Zhao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing

Kai Zhou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Hardware & Architecture

Secure outsourcing of modular exponentiations under single untrusted programme model

Yong Ding et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2017)

Article Computer Science, Software Engineering

How to securely outsource the inversion modulo a large composite number

Qianqian Su et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2017)

Article Computer Science, Theory & Methods

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Proceedings Paper Computer Science, Theory & Methods

Sanitization of FHE Ciphertexts

Leo Ducas et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I (2016)

Proceedings Paper Computer Science, Information Systems

Efficient Techniques for Publicly Verifiable Delegation of Computation

Kaoutar Elkhiyaoui et al.

ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Theory & Methods

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Cloud Computing Service: The Case of Large Matrix Determinant Computation

Xinyu Lei et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Theory & Methods

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Efficient computation outsourcing for inverting a class of homomorphic functions

Fangguo Zhang et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Hardware & Architecture

A Survey of Computation Offloading for Mobile Systems

Karthik Kumar et al.

MOBILE NETWORKS & APPLICATIONS (2013)

Article Computer Science, Theory & Methods

Addressing cloud computing security issues

Dimitrios Zissis et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE (2012)

Article Computer Science, Software Engineering

Security Challenges for the Public Cloud

Kui Ren et al.

IEEE INTERNET COMPUTING (2012)

Editorial Material Computer Science, Information Systems

Editorial: Big Services Era: Global Trends of Cloud Computing and Big Data

Liang-Jie (LJ) Zhang

IEEE TRANSACTIONS ON SERVICES COMPUTING (2012)

Proceedings Paper Computer Science, Theory & Methods

Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP

Zvika Brakerski

ADVANCES IN CRYPTOLOGY - CRYPTO 2012 (2012)

Article Computer Science, Hardware & Architecture

A View of Cloud Computing

Michael Armbrust et al.

COMMUNICATIONS OF THE ACM (2010)