INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
暂无分享,去创建一个
[1] P. Dhanalakshmi,et al. PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD , 2013 .
[2] Mikhail J. Atallah,et al. Secure outsourcing of sequence comparisons , 2005, International Journal of Information Security.
[3] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[4] Wenliang Du,et al. Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[5] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[6] Abhishek Pandey,et al. DATA SECURITY FRAMEWORK FOR CLOUD COMPUTING NETWORKS , 2013 .
[7] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[8] Mikhail J. Atallah,et al. Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[9] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[10] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[11] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[12] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[13] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[14] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.