找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Introduction to Secure Outsourcing Computation; Xiaofeng Chen Book 2016 Springer Nature Switzerland AG 2016

[復(fù)制鏈接]
查看: 55069|回復(fù): 35
樓主
發(fā)表于 2025-3-21 16:18:23 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Introduction to Secure Outsourcing Computation
編輯Xiaofeng Chen
視頻videohttp://file.papertrans.cn/475/474158/474158.mp4
叢書名稱Synthesis Lectures on Information Security, Privacy, and Trust
圖書封面Titlebook: Introduction to Secure Outsourcing Computation;  Xiaofeng Chen Book 2016 Springer Nature Switzerland AG 2016
描述With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.
出版日期Book 2016
版次1
doihttps://doi.org/10.1007/978-3-031-02348-4
isbn_softcover978-3-031-01220-4
isbn_ebook978-3-031-02348-4Series ISSN 1945-9742 Series E-ISSN 1945-9750
issn_series 1945-9742
copyrightSpringer Nature Switzerland AG 2016
The information of publication is updating

書目名稱Introduction to Secure Outsourcing Computation影響因子(影響力)




書目名稱Introduction to Secure Outsourcing Computation影響因子(影響力)學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation網(wǎng)絡(luò)公開度




書目名稱Introduction to Secure Outsourcing Computation網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation被引頻次




書目名稱Introduction to Secure Outsourcing Computation被引頻次學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation年度引用




書目名稱Introduction to Secure Outsourcing Computation年度引用學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation讀者反饋




書目名稱Introduction to Secure Outsourcing Computation讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:34:48 | 只看該作者
Book 2016The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.
板凳
發(fā)表于 2025-3-22 00:42:36 | 只看該作者
地板
發(fā)表于 2025-3-22 07:33:38 | 只看該作者
978-3-031-01220-4Springer Nature Switzerland AG 2016
5#
發(fā)表于 2025-3-22 09:54:38 | 只看該作者
Introduction to Secure Outsourcing Computation978-3-031-02348-4Series ISSN 1945-9742 Series E-ISSN 1945-9750
6#
發(fā)表于 2025-3-22 13:35:24 | 只看該作者
Introduction,In this chapter, we present the security challenges and formal definitions of secure outsourcing computation. We also introduce the general outsourcing framework of an arbitrary function introduced by Gennaro, Gentry, and Parno [74].
7#
發(fā)表于 2025-3-22 18:55:46 | 只看該作者
Preliminaries,In this chapter, we introduce some preliminaries for this book. We assume that the readers have some basic knowledge of number theory, basic algebra, and cryptography and thus will not present them here.
8#
發(fā)表于 2025-3-22 23:53:27 | 只看該作者
9#
發(fā)表于 2025-3-23 04:49:35 | 只看該作者
Secure Outsourcing of Scientific Computations,tion to the problem of how to securely outsource different kinds of expensive computations. Abadi et al. [2] first proved the impossibility of secure outsourcing an exponential computation while locally doing only polynomial time work. Therefore, it is meaningful only to consider outsourcing expensive polynomial time computations.
10#
發(fā)表于 2025-3-23 06:07:56 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-6 16:46
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
将乐县| 永定县| 电白县| 鹤庆县| 青冈县| 思茅市| 大港区| 扶沟县| 四子王旗| 邯郸市| 东乡族自治县| 安西县| 宜兰县| 北京市| 合阳县| 乌鲁木齐县| 长兴县| 含山县| 柳江县| 奉节县| 比如县| 唐河县| 新干县| 松原市| 张掖市| 北海市| 宜丰县| 唐山市| 北海市| 土默特右旗| 株洲市| 濉溪县| 耿马| 仲巴县| 四川省| 苏州市| 工布江达县| 博客| 库伦旗| 连城县| 十堰市|