找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Introduction to Secure Outsourcing Computation; Xiaofeng Chen Book 2016 Springer Nature Switzerland AG 2016

[復(fù)制鏈接]
查看: 55069|回復(fù): 35
樓主
發(fā)表于 2025-3-21 16:18:23 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Introduction to Secure Outsourcing Computation
編輯Xiaofeng Chen
視頻videohttp://file.papertrans.cn/475/474158/474158.mp4
叢書名稱Synthesis Lectures on Information Security, Privacy, and Trust
圖書封面Titlebook: Introduction to Secure Outsourcing Computation;  Xiaofeng Chen Book 2016 Springer Nature Switzerland AG 2016
描述With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.
出版日期Book 2016
版次1
doihttps://doi.org/10.1007/978-3-031-02348-4
isbn_softcover978-3-031-01220-4
isbn_ebook978-3-031-02348-4Series ISSN 1945-9742 Series E-ISSN 1945-9750
issn_series 1945-9742
copyrightSpringer Nature Switzerland AG 2016
The information of publication is updating

書目名稱Introduction to Secure Outsourcing Computation影響因子(影響力)




書目名稱Introduction to Secure Outsourcing Computation影響因子(影響力)學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation網(wǎng)絡(luò)公開度




書目名稱Introduction to Secure Outsourcing Computation網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation被引頻次




書目名稱Introduction to Secure Outsourcing Computation被引頻次學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation年度引用




書目名稱Introduction to Secure Outsourcing Computation年度引用學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation讀者反饋




書目名稱Introduction to Secure Outsourcing Computation讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:34:48 | 只看該作者
Book 2016The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.
板凳
發(fā)表于 2025-3-22 00:42:36 | 只看該作者
地板
發(fā)表于 2025-3-22 07:33:38 | 只看該作者
978-3-031-01220-4Springer Nature Switzerland AG 2016
5#
發(fā)表于 2025-3-22 09:54:38 | 只看該作者
Introduction to Secure Outsourcing Computation978-3-031-02348-4Series ISSN 1945-9742 Series E-ISSN 1945-9750
6#
發(fā)表于 2025-3-22 13:35:24 | 只看該作者
Introduction,In this chapter, we present the security challenges and formal definitions of secure outsourcing computation. We also introduce the general outsourcing framework of an arbitrary function introduced by Gennaro, Gentry, and Parno [74].
7#
發(fā)表于 2025-3-22 18:55:46 | 只看該作者
Preliminaries,In this chapter, we introduce some preliminaries for this book. We assume that the readers have some basic knowledge of number theory, basic algebra, and cryptography and thus will not present them here.
8#
發(fā)表于 2025-3-22 23:53:27 | 只看該作者
9#
發(fā)表于 2025-3-23 04:49:35 | 只看該作者
Secure Outsourcing of Scientific Computations,tion to the problem of how to securely outsource different kinds of expensive computations. Abadi et al. [2] first proved the impossibility of secure outsourcing an exponential computation while locally doing only polynomial time work. Therefore, it is meaningful only to consider outsourcing expensive polynomial time computations.
10#
發(fā)表于 2025-3-23 06:07:56 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-6 16:46
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
射阳县| 新源县| 大邑县| 抚顺县| 遂昌县| 竹北市| 泸水县| 靖西县| 浦城县| 兰考县| 武强县| 越西县| 大同县| 丰县| 拉孜县| 郸城县| 建宁县| 大荔县| 玉环县| 焉耆| 汾西县| 永新县| 纳雍县| 连南| 定州市| 深州市| 乌拉特中旗| 鸡东县| 敖汉旗| 凤山市| 广安市| 眉山市| 吉安市| 锡林浩特市| 时尚| 平南县| 宁化县| 蓝田县| 金湖县| 屏东县| 芜湖县|