咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 10 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 10 篇 outsource-secure...
  • 9 篇 cloud computing
  • 3 篇 linear programmi...
  • 2 篇 internet of thin...
  • 2 篇 data secrecy
  • 2 篇 modular exponent...
  • 2 篇 bilinear pairing...
  • 1 篇 chinese remainde...
  • 1 篇 internet of thin...
  • 1 篇 data security
  • 1 篇 outsourcing
  • 1 篇 task analysis
  • 1 篇 system of linear...
  • 1 篇 image edge detec...
  • 1 篇 privacy preservi...
  • 1 篇 servers
  • 1 篇 smart contract
  • 1 篇 multiple modular...
  • 1 篇 untrusted progra...
  • 1 篇 blockchain

机构

  • 4 篇 xidian univ stat...
  • 3 篇 virginia polytec...
  • 3 篇 guangzhou univ s...
  • 2 篇 xidian univ sch ...
  • 2 篇 qingdao univ col...
  • 2 篇 nanjing univ pos...
  • 2 篇 city univ hong k...
  • 1 篇 wuhan univ sch c...
  • 1 篇 univ texas san a...
  • 1 篇 infocomm securit...
  • 1 篇 shandong prov ke...
  • 1 篇 school of mathem...
  • 1 篇 department of co...
  • 1 篇 fujian normal un...
  • 1 篇 guangzhou univ s...
  • 1 篇 state key labora...
  • 1 篇 nanjing universi...
  • 1 篇 univ wollongong ...
  • 1 篇 fujian normal un...
  • 1 篇 s china univ tec...

作者

  • 4 篇 li jin
  • 4 篇 chen xiaofeng
  • 3 篇 ma jianfeng
  • 3 篇 lou wenjing
  • 2 篇 yu jia
  • 2 篇 huang xinyi
  • 2 篇 wong duncan s.
  • 2 篇 tang qiang
  • 2 篇 zhang hanlin
  • 1 篇 tian chengliang
  • 1 篇 liu josolph
  • 1 篇 josolph liu
  • 1 篇 haixin nie
  • 1 篇 ye jun
  • 1 篇 lin chao
  • 1 篇 xiaofeng chen
  • 1 篇 hao rong
  • 1 篇 tang shaohua
  • 1 篇 choo kim-kwang r...
  • 1 篇 zhi-kuan wang

语言

  • 10 篇 英文
检索条件"主题词=Outsource-secure algorithms"
10 条 记 录,以下是1-10 订阅
排序:
Privacy-Preserving and Distributed algorithms for Modular Exponentiation in IoT With Edge Computing Assistance
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2020年 第9期7卷 8769-8779页
作者: Li, Hongjun Yu, Jia Zhang, Hanlin Yang, Ming Wang, Huaqun Qingdao Univ Coll Comp Sci & Technol Qingdao 266071 Peoples R China Qilu Univ Technol Shandong Acad Sci Jinan 250353 Peoples R China Natl Supercomp Ctr Jinan Shandong Comp Sci Ctr Jinan 250014 Peoples R China Shandong Prov Key Lab Comp Networks Jinan 250014 Peoples R China Nanjing Univ Posts & Telecommun Jiangsu Key Lab Big Data Secur & Intelligent Proc Nanjing 210023 Peoples R China
With the development of Internet of Things (IoT) and 5G, edge computing, as a new computing paradigm, has been widely popularized in academia and industry. Due to the distributed architecture and being close to the us... 详细信息
来源: 评论
Blockchain-based system for secure outsourcing of bilinear pairings
收藏 引用
INFORMATION SCIENCES 2020年 527卷 590-601页
作者: Lin, Chao He, Debiao Huang, Xinyi Xie, Xiang Choo, Kim-Kwang Raymond Wuhan Univ Sch Cyber Sci & Engn Key Lab Aerosp Informat Secur & Trusted Comp Minist Educ Wuhan Peoples R China Nanjing Univ Posts & Telecommun Jiangsu Key Lab Big Data Secur & Intelligent Proc Nanjing Peoples R China Fujian Normal Univ Coll Math & Informat Fujian Prov Key Lab Network Secur & Cryptol Fuzhou Peoples R China Juzix Technol Co Ltd Shenzhen Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX USA Univ Texas San Antonio Dept Elect & Comp Engn San Antonio TX USA
secure computation outsourcing in Internet of Things (IoT) system is an ongoing research challenge, partly due to the resource-constrained nature of most (inexpensive) IoT devices. In this paper, we focus on the secur... 详细信息
来源: 评论
How to securely outsource the inversion modulo a large composite number
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2017年 129卷 26-34页
作者: Su, Qianqian Yu, Jia Tian, Chengliang Zhang, Hanlin Hao, Rong Qingdao Univ Coll Comp Sci & Technol Qingdao 266071 Peoples R China Nanjing Univ Informat Sci & Technol Sch Comp & Software Nanjing 210044 Jiangsu Peoples R China
Modular inversion is one of the most basic computations in algorithmic number theory. When it comes to cryptosystems, this computation is very time-consuming since the modulus is generally a large number. It is unreal... 详细信息
来源: 评论
secure Outsourcing of Large-scale Linear Programming
Secure Outsourcing of Large-scale Linear Programming
收藏 引用
2017 2nd International Conference on Wireless Communication and Network Engineering(WCNE 2017)
作者: Zhi-kuan WANG Yang LIU Nanjing University of Aeronautics and Astronautics
Linear programming(LP) is often used in reality production and life, such as the use of resources, human resource management, production arrangement. The client should pay out huge amounts of overhead to dispose huge ... 详细信息
来源: 评论
Efficient algorithms for secure outsourcing of bilinear pairings
收藏 引用
THEORETICAL COMPUTER SCIENCE 2015年 第C期562卷 112-121页
作者: Chen, Xiaofeng Susilo, Willy Li, Jin Wong, Duncan S. Ma, Jianfeng Tang, Shaohua Tang, Qiang Xidian Univ State Key Lab Integrated Serv Networks ISN Xian Peoples R China Univ Wollongong Sch Comp Sci & Software Engn Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia Guangzhou Univ Sch Comp Sci & Educ Software Guangzhou Guangdong Peoples R China City Univ Hong Kong Dept Comp Sci Hong Kong Hong Kong Peoples R China S China Univ Technol Sch Comp Sci & Engn Guangzhou Guangdong Peoples R China Univ Luxembourg APSIA Grp SnT L-1359 Luxembourg Luxembourg
The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure outsourcing algorithm for bilinea... 详细信息
来源: 评论
New algorithms for secure Outsourcing of Large-Scale Systems of Linear Equations
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2015年 第1期10卷 69-78页
作者: Chen, Xiaofeng Huang, Xinyi Li, Jin Ma, Jianfeng Lou, Wenjing Wong, Duncan S. Xidian Univ State Key Lab Integrated Serv Networks Xian 710065 Peoples R China Fujian Normal Univ Sch Math & Comp Sci Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350007 Peoples R China Guangzhou Univ Sch Comp Sci Guangzhou 510006 Guangdong Peoples R China Xidian Univ Sch Comp Sci & Technol Xian 710065 Peoples R China Virginia Polytech Inst & State Univ Dept Comp Sci Blacksburg VA 24061 USA City Univ Hong Kong Dept Comp Sci Hong Kong Hong Kong Peoples R China
With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attentions in the scientifi... 详细信息
来源: 评论
secure Outsourcing of Multiple Modular Exponentiations  29
Secure Outsourcing of Multiple Modular Exponentiations
收藏 引用
IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA)
作者: Li, Jinyang Ye, Jun Xidian Univ State Key Lab Integrated Serv Networks ISN Xian Peoples R China Sichuan Univ Sci & Engn Sch Sci Zigogn Peoples R China
Modular exponentiation with a large modulus, which is usually accomplished by repeated modular multiplications, has been widely used in public key cryptosystems for secure data communications. Hohenberger and Lysyansk... 详细信息
来源: 评论
New algorithms for secure Outsourcing of Modular Exponentiations
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2014年 第9期25卷 2386-2396页
作者: Chen, Xiaofeng Li, Jin Ma, Jianfeng Tang, Qiang Lou, Wenjing Xidian Univ State Key Lab Integrated Serv Networks ISN Xian Peoples R China Guangzhou Univ Sch Comp Sci & Educ Software Guangzhou Guangdong Peoples R China Xidian Univ Sch Comp Sci & Technol Xian Peoples R China Univ Luxembourg SnT Walferdange Luxembourg Virginia Polytech Inst & State Univ Dept Comp Sci Blacksburg VA 24061 USA
With the rapid development of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attention in the scientific community. Expo... 详细信息
来源: 评论
Efficient and Verifiable Algorithm for secure Outsourcing of Large-scale Linear Programming
Efficient and Verifiable Algorithm for Secure Outsourcing of...
收藏 引用
28th IEEE International Conference on Advanced Information Networking and Applications Workshops (IEEE WAINA)
作者: Nie, Haixin Chen, Xiaofeng Li, Jin Liu, Josolph Lou, Wenjing Xidian Univ Sch Math & Stat Xian Peoples R China Xidian Univ State Key Lab Integrated Serv Networks ISN Xian Peoples R China Guangzhou Univ Sch Comp Sci & Educ Software Guangzhou Guangdong Peoples R China I2R Infocomm Secur Dept Singapore Singapore Virginia Polytech Inst & State Univ Dept Comp Sci Blacksburg VA 24061 USA
Linear programming (LP) has been well studied in the scientific community for various engineering applications such as network flow problems, packet routing, portfolio optimization, and financial data management, etc.... 详细信息
来源: 评论
Efficient and Verifiable Algorithm for secure Outsourcing of Large-scale Linear Programming
Efficient and Verifiable Algorithm for Secure Outsourcing of...
收藏 引用
IEEE International Conference on Advanced Information Networking and Applications
作者: Haixin Nie Xiaofeng Chen Jin Li Josolph Liu Wenjing Lou School of Mathematics and Statistics Xidian University P.R. China State Key Laboratory of Integrated Service Networks (ISN) Xidian University P.R. China School of Computer Science and Educational Software Guangzhou University P.R. China Infocomm Security Department Institute for Infocomm Research (I2R) Singapore Department of Computer Science Virginia Polytechnic Institute and State University USA
Linear programming (LP) has been well studied in the scientific community for various engineering applications such as network flow problems, packet routing, portfolio optimization, and financial data management, etc.... 详细信息
来源: 评论