Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud (Q2441503): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 4 users not shown)
Property / author
 
Property / author: Yuan-Yuan Yang / rank
Normal rank
 
Property / author
 
Property / author: Yuan-Yuan Yang / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SparseMatrix / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: NETLIB LP Test Set / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.jpdc.2013.11.007 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1988007981 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verifiable Delegation of Computation over Large Datasets / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Generate Cryptographically Strong Sequences of Pseudorandom Bits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4821526 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Delegation of Computation Using Fully Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The university of Florida sparse matrix collection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mathematics of Public Key Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4198056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549691 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The knowledge complexity of interactive proof-systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2747613 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy-preserving linear programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy-preserving horizontally partitioned linear programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3328350 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2768030 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Theory of Secrecy Systems* / rank
 
Normal rank

Latest revision as of 12:57, 7 July 2024

scientific article
Language Label Description Also known as
English
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
scientific article

    Statements

    Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud (English)
    0 references
    0 references
    0 references
    0 references
    25 March 2014
    0 references
    0 references
    0 references
    0 references
    0 references
    computation outsourcing
    0 references
    linear equation solving
    0 references
    linear programming
    0 references
    cloud computing
    0 references
    distributed computing
    0 references
    0 references