Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
暂无分享,去创建一个
[1] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[2] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[3] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[4] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[5] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[6] Wenliang Du,et al. A study of several specific secure two-party computation problems , 2001 .
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Wenliang Du,et al. Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[9] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[10] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[11] V. Strassen. Gaussian elimination is not optimal , 1969 .
[12] Octavian Catrina,et al. Secure Multiparty Linear Programming Using Fixed-Point Arithmetic , 2010, ESORICS.
[13] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[14] Doug Szajda,et al. Hardening functions for large scale distributed computations , 2003, 2003 Symposium on Security and Privacy, 2003..
[15] Thomas H. Cormen,et al. Introduction to algorithms [2nd ed.] , 2001 .
[16] Matthew Roughan,et al. Hiccups on the road to privacy-preserving linear programming , 2009, WPES '09.
[17] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[18] Jaideep Vaidya,et al. Privacy-preserving linear programming , 2009, SAC '09.
[19] J SivaSankar,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2015 .
[20] Mikhail J. Atallah,et al. Secure outsourcing of sequence comparisons , 2004, International Journal of Information Security.
[21] David A. McAllester,et al. Solving Polynomial Systems Using a Branch and Prune Approach , 1997 .
[22] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.
[23] Mikhail J. Atallah,et al. Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[24] Olvi L. Mangasarian. Privacy-preserving horizontally partitioned linear programs , 2012, Optim. Lett..
[25] Yael Tauman Kalai,et al. Delegating computation: interactive proofs for muggles , 2008, STOC.
[26] Christian Jansson. An NP-Hardness Result for Nonlinear Systems , 1998, Reliab. Comput..
[27] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[28] Don Coppersmith,et al. Matrix multiplication via arithmetic progressions , 1987, STOC.
[29] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[30] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[31] W. Marsden. I and J , 2012 .
[32] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[33] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[34] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[35] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[36] David G. Luenberger,et al. Linear and nonlinear programming , 1984 .
[37] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[38] Tomas Toft. Solving Linear Programs Using Multiparty Computation , 2009, Financial Cryptography.
[39] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[40] Jaideep Vaidya. A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming , 2009, 2009 International Conference on Advanced Information Networking and Applications.