Pages that link to "Item:Q2985269"
From MaRDI portal
The following pages link to Verifiable Computation over Large Database with Incremental Updates (Q2985269):
Displayed 21 items.
- A symmetric cryptographic scheme for data integrity verification in cloud databases (Q781030) (← links)
- Incentive-driven attacker for corrupting two-party protocols (Q1626274) (← links)
- Efficient and secure big data storage system with leakage resilience in cloud computing (Q1626278) (← links)
- Research on QoS service composition based on coevolutionary genetic algorithm (Q1626285) (← links)
- Practical public key encryption with selective opening security for receivers (Q2004703) (← links)
- New publicly verifiable computation for batch matrix multiplication (Q2004759) (← links)
- Identity-based data storage scheme with anonymous key generation in fog computing (Q2152910) (← links)
- Differentially private naive Bayes learning over multiple data sources (Q2195313) (← links)
- Privacy preserving multi-party computation delegation for deep learning in cloud computing (Q2198099) (← links)
- Notes on a provably-secure certificate-based encryption against malicious CA attacks (Q2198258) (← links)
- CPP: towards comprehensive privacy preserving for query processing in information networks (Q2200591) (← links)
- Secure multi-label data classification in cloud by additionally homomorphic encryption (Q2200632) (← links)
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices (Q2200702) (← links)
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem (Q2200703) (← links)
- Publicly verifiable database scheme with efficient keyword search (Q2201628) (← links)
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage (Q2215031) (← links)
- Publicly verifiable databases with efficient insertion/deletion operations (Q2396817) (← links)
- Efficient request-based comparable encryption scheme based on sliding window method (Q2403279) (← links)
- A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes (Q2660907) (← links)
- Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption (Q3297619) (← links)
- An Almost Non-interactive Order Preserving Encryption Scheme (Q6163654) (← links)