Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing
暂无分享,去创建一个
[1] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[2] Mianxiong Dong,et al. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[3] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[4] Mianxiong Dong,et al. Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory , 2016, IEEE Transactions on Services Computing.
[5] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[6] Xiao Liu,et al. A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs , 2016, Sensors.
[7] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[8] George Danezis,et al. Proceedings of the 2012 ACM conference on Computer and communications security , 2012, CCS 2012.
[9] Alptekin Küpçü,et al. Incentivizing outsourced computation , 2008, NetEcon '08.
[10] Minyi Guo,et al. LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[11] Hongwei Li,et al. Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications , 2014, GLOBECOM 2014.
[12] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[13] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[14] Xiao Liu,et al. A comprehensive analysis for fair probability marking based traceback approach in WSNs , 2016, Secur. Commun. Networks.
[15] Xiaodong Lin,et al. Achieving authorized and ranked multi-keyword search over encrypted cloud data , 2015, 2015 IEEE International Conference on Communications (ICC).
[16] Yuan-Shun Dai,et al. Enabling efficient publicly verifiable outsourcing computation for matrix multiplication , 2015, 2015 International Telecommunication Networks and Applications Conference (ITNAC).
[17] Hongwei Li,et al. Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.