Techniques for Secure and Reliable Computational Outsourcing
暂无分享,去创建一个
[1] Mikhail J. Atallah,et al. Efficient data structures for range-aggregate queries on trees , 2009, ICDT '09.
[2] Mikhail J. Atallah,et al. Privacy-Preserving Business Process Outsourcing , 2012, 2012 IEEE 19th International Conference on Web Services.
[3] Marina Blanton,et al. Secure outsourced computation of iris matching , 2012, J. Comput. Secur..
[4] Keith B. Frikken,et al. Outsourcing Manufacturing: Secure Price‐Masking Mechanisms for Purchasing Component Parts , 2011 .
[5] Mikhail J. Atallah,et al. Efficient Private Record Linkage , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[6] Yihua Zhang,et al. An Overview of Issues and Recent Developments in Cloud Computing and Storage Security , 2014 .
[7] Mikhail J. Atallah,et al. Running Max/Min Filters Using 1+o(1) Comparisons per Sample , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Marina Blanton,et al. Private and oblivious set and multiset operations , 2012, ASIACCS '12.
[9] Marina Blanton,et al. Biometric-Based Non-transferable Anonymous Credentials , 2009, ICICS.
[10] Mikhail J. Atallah,et al. Computing all skyline probabilities for uncertain data , 2009, PODS.
[11] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[12] Emil Stefanov,et al. Duress detection for authentication attacks against multiple administrators , 2010, Insider Threats '10.
[13] Marina Blanton. Achieving Full Security in Privacy-Preserving Data Mining , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[14] Mikhail J. Atallah,et al. Efficient and secure distribution of massive geo-spatial data , 2009, GIS.
[15] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[16] Mikhail J. Atallah,et al. Efficient relaxed search in hierarchically clustered sequence datasets , 2012, JEAL.
[17] Mikhail J. Atallah,et al. Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS , 2012, Cloud-I '12.
[18] Mikhail J. Atallah,et al. Identifying Interesting Instances for Probabilistic Skylines , 2010, DEXA.
[19] Mikhail J. Atallah,et al. Secure and Efficient Outsourcing of Sequence Comparisons , 2012, ESORICS.
[20] Mikhail J. Atallah,et al. Secure Authenticated Comparisons , 2011, ACNS.
[21] Yihua Zhang,et al. Secure and Verifiable Outsourcing of Large-Scale Biometric Computations , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[22] Mikhail J. Atallah,et al. Pattern matching in the Hamming distance with thresholds , 2011, Inf. Process. Lett..
[23] Marina Blanton,et al. On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting , 2011, Proceedings of the International Conference on Security and Cryptography.
[24] Marina Blanton,et al. Secure Outsourcing of DNA Searching via Finite Automata , 2010, DBSec.
[25] Mikhail J. Atallah,et al. Efficient and Practical Approach for Private Record Linkage , 2012, JDIQ.
[26] Elisa Bertino,et al. Leakage-free redactable signatures , 2012, CODASPY '12.
[27] Daniel G. Aliaga,et al. Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity , 2009, Comput. Graph. Forum.
[28] Mikhail J. Atallah,et al. Asymptotically efficient algorithms for skyline probabilities of uncertain data , 2011, TODS.
[29] Mikhail J. Atallah,et al. Data structures for range minimum queries in multidimensional arrays , 2010, SODA '10.
[30] Mikhail J. Atallah,et al. Private Outsourcing of Matrix Multiplication over Closed Semi-rings , 2012, SECRYPT.
[31] Paolo Falcarin,et al. Guest Editors' Introduction: Software Protection , 2011, IEEE Software.
[32] Mikhail J. Atallah,et al. Robust Authentication Using Physically Unclonable Functions , 2009, ISC.
[33] Elisa Bertino,et al. On the Complexity of Authorization in RBAC under Qualification and Security Constraints , 2011, IEEE Transactions on Dependable and Secure Computing.