Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems
暂无分享,去创建一个
[1] Elisa Bertino,et al. Single-Database Private Information Retrieval from Fully Homomorphic Encryption , 2013, IEEE Transactions on Knowledge and Data Engineering.
[2] Laurence T. Yang,et al. Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing , 2017, Inf. Sci..
[3] Stratis Ioannidis,et al. Privacy-preserving matrix factorization , 2013, CCS.
[4] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[5] Joseph K. Liu,et al. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.
[6] Keke Gai,et al. Resource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computing , 2018, IEEE Transactions on Sustainable Computing.
[7] Nikos D. Sidiropoulos,et al. Tensors for Data Mining and Data Fusion , 2016, ACM Trans. Intell. Syst. Technol..
[8] Yang Xiang,et al. Embedded Device Forensics and Security , 2017, ACM Trans. Embed. Comput. Syst..
[9] Yehuda Lindell. Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich , 2017 .
[10] Francisco Javier González-Serrano,et al. Training Support Vector Machines with privacy-protected data , 2017, Pattern Recognit..
[11] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[12] Laurence T. Yang,et al. A Big Data-as-a-Service Framework: State-of-the-Art and Perspectives , 2018, IEEE Transactions on Big Data.
[13] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[14] Stanley B. Zdonik,et al. Answering Aggregation Queries in a Secure System Model , 2007, VLDB.
[15] Myeonggil Choi. Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing , 2016 .
[16] Albert Y. Zomaya,et al. Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing , 2018, IEEE Communications Magazine.
[17] Ahmad-Reza Sadeghi,et al. A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design , 2013, J. Comput. Secur..
[18] Ting Yu,et al. Dynamic and Efficient Private Keyword Search over Inverted Index--Based Encrypted Data , 2016, ACM Trans. Internet Techn..
[19] Laurence T. Yang,et al. A Tensor Computation and Optimization Model for Cyber-Physical-Social Big Data , 2019, IEEE Transactions on Sustainable Computing.
[20] Laurence T. Yang,et al. The Cyber-Physical-Social Transition Tensor Service Framework , 2018 .
[21] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[22] Changyu Dong,et al. A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost , 2014, ESORICS.
[23] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[24] Qian Wang,et al. Searchable Encryption over Feature-Rich Data , 2018, IEEE Transactions on Dependable and Secure Computing.
[25] Mohamed Elhoseny,et al. Secure Automated Forensic Investigation for Sustainable Critical Infrastructures Compliant with Green Computing Requirements , 2020, IEEE Transactions on Sustainable Computing.
[26] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[27] Elisa Bertino,et al. Private Searching on Streaming Data Based on Keyword Frequency , 2014, IEEE Transactions on Dependable and Secure Computing.
[28] Kim-Kwang Raymond Choo,et al. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.
[29] Wen Hu,et al. Talos: Encrypted Query Processing for the Internet of Things , 2015, SenSys.
[30] Ruby B. Lee,et al. CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing , 2015, 2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA).
[31] Laurence T. Yang,et al. Tensor-based Big Biometric Data Reduction in Cloud , 2018, IEEE Cloud Computing.
[32] Shucheng Yu,et al. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[33] Raphael C.-W. Phan,et al. Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis , 2013, IEEE Transactions on Affective Computing.