Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference42 articles.
1. Applebaum B, Ishai Y, Kushilevitz E. From secrecy to soundness: efficient verification via secure computation. In: International Colloquium on Automata, Languages, and Programming, Springer. 2010;pp 152–163.
2. Atallah MJ, Pantazopoulos KN, Rice JR, et al. Secure outsourcing of scientific computations. In: Advances in computers, vol. 54. Elsevier; 2002. p. 215–72.
3. Azzedin F. Trust-based taxonomy for free riders in distributed multimedia systems. In: 2010 International Conference on High Performance Computing & Simulation. 2010;pp. 362–369. https://doi.org/10.1109/HPCS.2010.5547108.
4. Azzedin F, Ghaleb M. Internet-of-things and information fusion: trust perspective survey. Sensors. 2019;19(8):1929.
5. Benabbas S, Gennaro R, Vahlis Y. Verifiable delegation of computation over large datasets. In: Annual Cryptology Conference, Springer, 2011; pp. 111–131.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献