A Domain Specific Language for Secure Outsourcing of Computation to the Cloud
暂无分享,去创建一个
[1] Mikhail J. Atallah,et al. Secure and Private Outsourcing of Shape-Based Feature Extraction , 2013, ICICS.
[2] Alvin AuYoung,et al. Using R for Iterative and Incremental Processing , 2012, HotCloud.
[3] Khaled M. Khan,et al. Trust in Cloud Services: Providing More Controls to Clients , 2013, Computer.
[4] Carole A. Goble,et al. The Taverna workflow suite: designing and executing workflows of Web Services on the desktop, web or in the cloud , 2013, Nucleic Acids Res..
[5] Terence Parr. The Definitive ANTLR Reference: Building Domain-Specific Languages , 2007 .
[6] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[7] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[8] Cong Wang,et al. Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations , 2011, 2011 31st International Conference on Distributed Computing Systems.
[9] Mikhail J. Atallah,et al. Secure and Efficient Outsourcing of Sequence Comparisons , 2012, ESORICS.
[10] Helger Lipmaa. Private Branching Programs: On Communication-Efficient Cryptocomputing , 2008, IACR Cryptol. ePrint Arch..
[11] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[12] David Evans,et al. Circuit Structures for Improving Efficiency of Security and Privacy Tools , 2013, 2013 IEEE Symposium on Security and Privacy.
[13] Abdelkarim Erradi,et al. Secure Outsourcing of Matrix Operations as a Service , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[14] Tom Davis,et al. Opengl programming guide: the official guide to learning opengl , 1993 .
[15] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[16] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[17] Zhengping Qian,et al. MadLINQ: large-scale distributed matrix computation for the cloud , 2012, EuroSys '12.
[18] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[19] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[20] Michael I. Schwartzbach,et al. A domain-specific programming language for secure multiparty computation , 2007, PLAS '07.
[21] Yaron Goland,et al. Web Services Business Process Execution Language , 2009, Encyclopedia of Database Systems.
[22] Khaled M. Khan,et al. Establishing Trust in Cloud Computing , 2010, IT Professional.
[23] Eric Darve,et al. Liszt: A domain specific language for building portable mesh-based PDE solvers , 2011, 2011 International Conference for High Performance Computing, Networking, Storage and Analysis (SC).
[24] Adi Shamir,et al. How to share a secret , 1979, CACM.
[25] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[26] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.