Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference27 articles.
1. Atallah M, Frikken K (2010) Securely outsourcing linear algebra computations. In: Proc of ASIACCS, pp 48–59
2. Mell P, Grance T (2010) Draft NIST working definition of cloud computing. Referenced on Jan 23rd, 2010. Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
3. Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105
4. Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Proc of CRYPTO’10, Aug 2010
5. Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: Proc of ICDCS’10
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献