Securely outsourcing of large scale linear fractional programming problem to public cloud
暂无分享,去创建一个
[1] Lifeng Zhou,et al. Outsourcing Large-Scale Quadratic Programming to a Public Cloud , 2015, IEEE Access.
[2] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[3] Tao Xiang,et al. Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud , 2014, J. Parallel Distributed Comput..
[4] Cong Wang,et al. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.
[5] Mikhail J. Atallah,et al. Secure outsourcing of sequence comparisons , 2004, International Journal of Information Security.
[6] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[7] Tingwen Huang,et al. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..
[8] R. Santosh,et al. An Efficient and Secure Nonlinear Programming Outsourcing in Cloud Computing , 2012 .
[9] A. S. Rambely,et al. Solving Linear Fractional Programming Problems with Interval Coefficients in the Objective Function. A New Approach , 2012 .
[10] Tingwen Huang,et al. Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.
[11] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[12] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[13] Cong Wang,et al. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud , 2013, IEEE Transactions on Emerging Topics in Computing.
[14] Tingwen Huang,et al. Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.
[15] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[16] Banoth Ravi,et al. Secure Outsourcing of Linear Optimization in Cloud Computing , 2012 .
[17] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[18] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[19] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[20] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[21] A. Chandrasekhar,et al. Non Linear Programming Computation Outsourcing in the Cloud , 2012 .
[22] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[23] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.