咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 17 篇 会议

馆藏范围

  • 38 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 32 篇 计算机科学与技术...
    • 17 篇 电气工程
    • 8 篇 信息与通信工程
    • 8 篇 软件工程
    • 4 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 生物医学工程(可授...
  • 5 篇 理学
    • 5 篇 数学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 38 篇 secure cloud com...
  • 6 篇 cloud computing
  • 6 篇 privacy
  • 6 篇 cryptography
  • 5 篇 homomorphic encr...
  • 4 篇 secure multi-par...
  • 3 篇 garbled circuits
  • 2 篇 anomaly detectio...
  • 2 篇 outsourcing
  • 2 篇 libraries
  • 2 篇 anomaly detectio...
  • 2 篇 fully homomorphi...
  • 2 篇 servers
  • 2 篇 legal metrology
  • 2 篇 client-server co...
  • 2 篇 hardware securit...
  • 2 篇 security
  • 2 篇 distributed comp...
  • 2 篇 trust management
  • 2 篇 encryption

机构

  • 1 篇 camelot itlab ma...
  • 1 篇 eurecom sophia a...
  • 1 篇 univ waterloo wa...
  • 1 篇 ait austrian ins...
  • 1 篇 king fahd univ p...
  • 1 篇 google mountain ...
  • 1 篇 tech univ berlin...
  • 1 篇 lund univ s-2210...
  • 1 篇 chinese acad sci...
  • 1 篇 academy of mathe...
  • 1 篇 shenzhen inst ar...
  • 1 篇 czech tech univ ...
  • 1 篇 school of mathem...
  • 1 篇 univ lausanne ch...
  • 1 篇 univ manitoba de...
  • 1 篇 ecole polytech f...
  • 1 篇 ut hlth sci ctr ...
  • 1 篇 univ calif san d...
  • 1 篇 sejong univ conv...
  • 1 篇 princeton univ p...

作者

  • 2 篇 jiang xiaoqian
  • 2 篇 mohammed noman
  • 2 篇 schneider johann...
  • 2 篇 mitchell john c.
  • 2 篇 toro federico gr...
  • 2 篇 oppermann alexan...
  • 2 篇 seifert jean-pie...
  • 2 篇 sadat md nazmus
  • 2 篇 ruan yefeng
  • 2 篇 haas zygmunt j.
  • 2 篇 zimmerman joe
  • 2 篇 thiel florian
  • 2 篇 durresi arjan
  • 1 篇 klemsa jakub
  • 1 篇 al-asli m.
  • 1 篇 lee ruby b.
  • 1 篇 huang jiwu
  • 1 篇 zhubin chen
  • 1 篇 sriram n. premna...
  • 1 篇 liao da-yin

语言

  • 37 篇 英文
  • 1 篇 中文
检索条件"主题词=Secure Cloud Computing"
38 条 记 录,以下是1-10 订阅
排序:
Twin clouds: secure cloud computing with Low Latency (Full Version)
Twin Clouds: Secure Cloud Computing with Low Latency (Full V...
收藏 引用
12th IFIP TC 6 AND TC 11 Conference on Communications and Multimedia Security (CMS 2011)
作者: Bugiel, Sven Nuernberger, Stefan Sadeghi, Ahmad-Reza Schneider, Thomas Tech Univ Darmstadt Ctr Adv Secur Res Darmstadt Darmstadt Germany
cloud computing promises a cost effective enabling technology to outsource storage and massively parallel computations. However, existing approaches for provably secure outsourcing of data and arbitrary computations a... 详细信息
来源: 评论
Blockchain as a Platform for secure cloud computing Services  22
Blockchain as a Platform for Secure Cloud Computing Services
收藏 引用
22nd IEEE International Conference on Advanced Communication Technology (ICACT)
作者: Tsai, Wang-You Chou, Tzu-Chuan Chen, Jiann-Liang Ma, Yi-Wei Huang, Chen-Jui Natl Taiwan Univ Sci & Technol Dept Informat Management Taipei Taiwan Natl Taiwan Univ Sci & Technol Dept Elect Engn Taipei Taiwan
Problems related to privacy and cyber-attacks have increased in recent years as a result of the rapid development of cloud computing. This work concerns secure cloud computing services on a blockchain platform, called... 详细信息
来源: 评论
secure cloud computing: Continuous Anomaly Detection Approach in Legal Metrology
Secure Cloud Computing: Continuous Anomaly Detection Approac...
收藏 引用
IEEE International Instrumentation and Measurement Technology Conference (I2MTC) - Discovering New Horizons in Instrumentation and Measurement
作者: Oppermann, Alexander Toro, Federico Grasso Thiel, Florian Seifert, Jean-Pierre Physikal Tech Bundesanstalt PTB Dept Metrol IT 85 Berlin Germany Tech Univ Berlin Secur Telecommunicat Berlin Germany
In the field of Legal Metrology, it shall be assured that all measurements are carried out by a trusted computer system. Securing Computer Systems, especially in a distributed environment can be a challenging task to ... 详细信息
来源: 评论
Implementation of Data Mining on a secure cloud computing over a Web API using Supervised Machine Learning Algorithm Data Mining in a secure cloud computing Environment through Restful API
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2022年 第5期13卷 1-4页
作者: Ige, Tosin Sikiru, Adewale Univ Texas El Paso Dept Comp Sci El Paso TX 79968 USA Virginia Technol Univ Dept Comp Sci Blacksburg VA USA
Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advan... 详细信息
来源: 评论
A Practical, secure, and Verifiable cloud computing for Mobile Systems
A Practical, Secure, and Verifiable Cloud Computing for Mobi...
收藏 引用
11th International Conference on Mobile Systems and Pervasive computing (MobiSPC)
作者: Premnath, Sriram N. Haas, Zygmunt J. Cornell Univ Ithaca NY 14853 USA
cloud computing systems, in which clients rent and share computing resources of third party platforms, have gained widespread use in recent years. Furthermore, cloud computing for mobile systems (i.e., systems in whic... 详细信息
来源: 评论
A Practical, secure, and Verifiable cloud computing for Mobile Systems
收藏 引用
Procedia Computer Science 2014年 34卷 474-483页
作者: Sriram N. Premnath Zygmunt J. Haas Cornell University 324 Frank Rhodes Hall Ithaca NY 14853 U.S.A
cloud computing systems, in which clients rent and share computing resources of third party platforms, have gained widespread use in recent years. Furthermore, cloud computing for mobile systems (i.e., systems in whic... 详细信息
来源: 评论
Efficient and secure MPC Through Integration of FHE and Proxy Re-encryption
收藏 引用
SN Computer Science 2025年 第2期6卷 1-10页
作者: Upadhyay, Rohitkumar R. Padhye, Sahadeo Motilal Nehru National Institute of Technology Allahabad Uttar Pradesh Prayagraj 211004 India
secure multi-party computation (MPC) protocols play a crucial role in facilitating collaboration among distrustful parties while safeguarding individual privacy. Traditional MPC protocols rely on private communication... 详细信息
来源: 评论
secure computing Enclaves Using FPGAs
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND secure computing 2021年 第2期18卷 593-604页
作者: Elrabaa, M. E. S. Al-Asli, M. Abu-Amara, M. King Fahd Univ Petr & Minerals Comp Engn Dept Dhahran 31261 Saudi Arabia
A new scheme for securing users' data and applications in public clouds and data centers using Field Programmable Gate Arrays (FPGAs) has been developed. This scheme incorporates all necessary protocols, hardware,... 详细信息
来源: 评论
On the Security of Homomorphic Encryption Schemes with Restricted Decryption Oracles
收藏 引用
Journal of Systems Science & Complexity 2024年 第5期37卷 2240-2261页
作者: MA Guangsheng LI Hongbo School of Mathematics and Physics North China Electric Power UniversityBeijing 100096China Academy of Mathematics and Systems Science Chinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 100049China
Fully homomorphic encryption(FHE)can be used for privacy-preserving aggregation of medical *** this typical application,the security against passive attacks has been well studied by Li and Micciancio(2021).In this pap... 详细信息
来源: 评论
Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks
收藏 引用
IEEE ACCESS 2021年 9卷 108851-108860页
作者: Shin, Youngjoo Yun, Joobeom Korea Univ Sch Cybersecur Seoul 02841 South Korea Sejong Univ Dept Comp & Informat Secur Seoul 05006 South Korea Sejong Univ Convergence Engn Intelligent Drone Seoul 05006 South Korea
Crypto libraries such as OpenSSL and Libgcrypt are essential building blocks for implementing secure cloud services. Unfortunately, these libraries are subject to cache side-channel attacks, which are more devastating... 详细信息
来源: 评论