Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference28 articles.
1. S. Agrawal, B. Libert, D. Stehlé, Fully secure functional encryption for inner products, from standard assumptions, in: M. Robshaw, J. Katz (Eds.), Advances in Cryptology - CRYPTO 2016. CRYPTO 2016. Lecture Notes in Computer Science, 2016, 9816:333–362.
2. Computing on authenticated data;Ahn;J. Cryptol.,2015
3. M. Backes, D. Fiore, R.M. Reischuk, Verifiable delegation of computation on outsourced data, in: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS ’13:863–874, 2013.
4. Verifiable delegation of computation over large datasets;Benabbas;Cryptol. ePrint Arch. Rep.,2011
5. S. Benabbas, R. Gennaro, Y. Vahlis, Verifiable delegation of computation over large datasets, in: P. Rogaway (Eds.), Advances in Cryptology - CRYPTO 2011. CRYPTO 2011. Lecture Notes in Computer Science, 6841:111–131, 2014.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献