Secure Remote Execution of Sequential Computations
暂无分享,去创建一个
[1] Michael I. Baron,et al. Probability and Statistics for Computer Scientists , 2013 .
[2] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.
[3] Andreas Haeberlen,et al. PeerReview: practical accountability for distributed systems , 2007, SOSP.
[4] Samuel P. Midkiff,et al. Lightweight Monitoring of the Progress of Remotely Executing Computations , 2005, LCPC.
[5] Philippe Golle,et al. Secure Distributed Computing in a Commercial Environment , 2002, Financial Cryptography.
[6] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[7] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[8] Giovanni Vigna,et al. Protecting Mobile Agents through Tracing , 1997 .
[9] Gage Js,et al. The great Internet Mersenne prime search. , 1998 .
[10] Ghassan O. Karame,et al. A Secure Hybrid Reputation Management System for Super-Peer Networks , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[11] Hongxia Jin,et al. Forensic analysis for tamper resistant software , 2003, 14th International Symposium on Software Reliability Engineering, 2003. ISSRE 2003..
[12] Michael Greenacre,et al. Book reviews: Correspondence analysis and data coding with Java and R. Fionn Murtagh. Chapman & Hall/CRC, 2005. Multidimensional nonlinear data analysis. Shizuhiko Nishiato. Chapman & Hall/CRC, 2006. , 2006 .
[13] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[14] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[15] Doug Szajda,et al. Hardening functions for large scale distributed computations , 2003, 2003 Symposium on Security and Privacy, 2003..
[16] Wenliang Du,et al. Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[17] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[18] Michael T. Goodrich. Pipelined algorithms to detect cheating in long-term grid computations , 2008, Theor. Comput. Sci..
[19] Wayne A. Jansen,et al. Mobile Agent Security , 1999 .
[20] Manuel Blum,et al. Software reliability via run-time result-checking , 1997, JACM.
[21] M. Degroot,et al. Probability and Statistics , 2021, Examining an Operational Approach to Teaching Probability.
[22] Ghassan O. Karame,et al. SuperTrust: a secure and efficient framework for handling trust in super-peer networks , 2007, PODC '07.