咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 1 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 软件工程
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 生物学

主题

  • 7 篇 private computin...
  • 2 篇 homomorphic encr...
  • 2 篇 privacy
  • 1 篇 reed-solomon cod...
  • 1 篇 reliability
  • 1 篇 scalability
  • 1 篇 data privacy
  • 1 篇 sparse matrices
  • 1 篇 recommender syst...
  • 1 篇 privacy preservi...
  • 1 篇 vectors
  • 1 篇 information-theo...
  • 1 篇 computational mo...
  • 1 篇 face identificat...
  • 1 篇 sparse represent...
  • 1 篇 cross-platform r...
  • 1 篇 differential pri...
  • 1 篇 costs
  • 1 篇 coding theory
  • 1 篇 security

机构

  • 1 篇 rhein westfal th...
  • 1 篇 beihang univ sch...
  • 1 篇 univ new brunswi...
  • 1 篇 sichuan univ key...
  • 1 篇 nanyang technol ...
  • 1 篇 jinan univ coll ...
  • 1 篇 sichuan univ sch...
  • 1 篇 city univ macau ...
  • 1 篇 gocpccc key lab ...
  • 1 篇 chalmers univers...
  • 1 篇 sichuan univ cyb...
  • 1 篇 wuhan univ sch c...
  • 1 篇 univ elect sci &...
  • 1 篇 mississippi stat...
  • 1 篇 xidian univ xian...
  • 1 篇 univ oulu sch so...
  • 1 篇 southern methodi...
  • 1 篇 nanjing inst tec...
  • 1 篇 beijing elect sc...

作者

  • 1 篇 meng ziyu
  • 1 篇 chen yingya
  • 1 篇 cao yuxin
  • 1 篇 jin yu
  • 1 篇 jin xin
  • 1 篇 yao xuyan
  • 1 篇 huang xinyi
  • 1 篇 chen li
  • 1 篇 reent schlegel
  • 1 篇 liu yan
  • 1 篇 nair v. s. s.
  • 1 篇 li hongwei
  • 1 篇 lu rongxing
  • 1 篇 pennekamp jan
  • 1 篇 xu guowen
  • 1 篇 ren hao
  • 1 篇 zhou zibo
  • 1 篇 zhang xin
  • 1 篇 zhang tianwei
  • 1 篇 zhang zongyang

语言

  • 7 篇 英文
检索条件"主题词=Private computing"
7 条 记 录,以下是1-10 订阅
排序:
Coding for Distributed computing: Reed-Solomon Codes for private, Distributed computing
Coding for Distributed Computing: Reed-Solomon Codes for Pri...
收藏 引用
作者: REENT SCHLEGEL CHALMERS UNIVERSITY OF TECHNOLOGY
学位级别:硕士
Distributed cluster systems have emerged as a useful way to perform large scale computations. These clusters can be rented at service providers, which imposes constraints regarding the privacy of the data the computat... 详细信息
来源: 评论
Efficiency Boosting of Secure Cross-Platform Recommender Systems Over Sparse Data
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE computing 2025年 第3期22卷 2146-2160页
作者: Ren, Hao Xu, Guowen Zhang, Tianwei Ning, Jianting Huang, Xinyi Li, Hongwei Lu, Rongxing Sichuan Univ Sch Cyber Sci & Engn Chengdu 610017 Peoples R China Sichuan Univ Key Lab Data Protect & Intelligent Management Minist Educ Chengdu 610017 Peoples R China Sichuan Univ Cyber Sci Res Inst Chengdu 610017 Peoples R China Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China Nanyang Technol Univ Sch Comp Sci & Engn Singapore 639798 Singapore Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Peoples R China City Univ Macau Fac Data Sci Macau 999078 Peoples R China Jinan Univ Coll Cyber Secur Guangzhou 510632 Peoples R China Univ New Brunswick Sch Comp Sci Brunswick NB E3B 5A3 Canada
Fueled by its successful commercialization, the recommender system (RS) has gained widespread attention. However, as the training data fed into the RS models are often highly sensitive, it ultimately leads to severe p... 详细信息
来源: 评论
Evolving the Industrial Internet of Things: The Advent of Secure Collaborations
Evolving the Industrial Internet of Things: The Advent of Se...
收藏 引用
IEEE/IFIP Network Operations and Management Symposium (NOMS)
作者: Pennekamp, Jan Rhein Westfal TH Aachen Commun & Distributed Syst Aachen Germany
The Industrial Internet of Things (IIoT) leads to increasingly-interconnected industrial processes and environments, which, in turn, result in stakeholders collecting a plethora of information. Even though the global ... 详细信息
来源: 评论
Enhancing Privacy Strategy in New Power Systems: Problem Assessment, Comparative Analysis and Suggestions  5th
Enhancing Privacy Strategy in New Power Systems: Problem Ass...
收藏 引用
5th International Conference on Big Data and Security (ICBDS)
作者: Chen, Li Yao, Xuyan Zhang, Xin Cao, Yuxin Su, Jiahe Tian, Yuan Nanjing Inst Technol Nanjing 211167 Jiangsu Peoples R China Univ Oulu Sch Software Engn Oulu 90014 Finland
This paper meticulously examines the privacy challenges stemming from the escalating volume of data within the new power systems. It thoroughly explores various privacy computing techniques, including encryption and s... 详细信息
来源: 评论
Lightweight Instance Batch Schemes Towards Prover-Efficient Decentralized private Computation  29th
Lightweight Instance Batch Schemes Towards Prover-Efficient ...
收藏 引用
29th Australasian Conference on Information Security and Privacy (ACISP)
作者: Meng, Ziyu Zhou, Zibo Zhang, Zongyang Jin, Yu Beihang Univ Sch Cyber Sci & Technol Beijing Peoples R China
Batch schemes provide a way to amortize the cost of NP verifiers across multiple instances. In this work, we introduce an instance batch scheme that allows a prover to iteratively prove the correctness of multiple exe... 详细信息
来源: 评论
Privacy Preserving Face Identification in the Cloud through Sparse Representation  10th
Privacy Preserving Face Identification in the Cloud through ...
收藏 引用
10th Chinese Conference on Biometric Recognition (CCBR)
作者: Jin, Xin Liu, Yan Li, Xiaodong Zhao, Geng Chen, Yingya Guo, Kui Beijing Elect Sci & Technol Inst Beijing 100070 Peoples R China GOCPCCC Key Lab Informat Secur Beijing 100070 Peoples R China Xidian Univ Xian 710071 Peoples R China
Nowadays, with tremendous visual media stored and even processed in the cloud, the privacy of visual media is also exposed to the cloud. In this paper we propose a private face identification method based on sparse re... 详细信息
来源: 评论
Secure Context Switch for private computing on Public Platforms
Secure Context Switch for Private Computing on Public Platfo...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM 08)
作者: Morris, Thomas H. Nair, V. S. S. Mississippi State Univ Mississippi State MS 39762 USA Southern Methodist Univ Dallas 77205 TX USA
private computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platforms. PCPP uses a host assessment to validat... 详细信息
来源: 评论