咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 17 篇 会议

馆藏范围

  • 38 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 32 篇 计算机科学与技术...
    • 17 篇 电气工程
    • 8 篇 信息与通信工程
    • 8 篇 软件工程
    • 4 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 生物医学工程(可授...
  • 5 篇 理学
    • 5 篇 数学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 38 篇 secure cloud com...
  • 6 篇 cloud computing
  • 6 篇 privacy
  • 6 篇 cryptography
  • 5 篇 homomorphic encr...
  • 4 篇 secure multi-par...
  • 3 篇 garbled circuits
  • 2 篇 anomaly detectio...
  • 2 篇 outsourcing
  • 2 篇 libraries
  • 2 篇 anomaly detectio...
  • 2 篇 fully homomorphi...
  • 2 篇 servers
  • 2 篇 legal metrology
  • 2 篇 client-server co...
  • 2 篇 hardware securit...
  • 2 篇 security
  • 2 篇 distributed comp...
  • 2 篇 trust management
  • 2 篇 encryption

机构

  • 1 篇 camelot itlab ma...
  • 1 篇 eurecom sophia a...
  • 1 篇 univ waterloo wa...
  • 1 篇 ait austrian ins...
  • 1 篇 king fahd univ p...
  • 1 篇 google mountain ...
  • 1 篇 tech univ berlin...
  • 1 篇 lund univ s-2210...
  • 1 篇 chinese acad sci...
  • 1 篇 academy of mathe...
  • 1 篇 shenzhen inst ar...
  • 1 篇 czech tech univ ...
  • 1 篇 school of mathem...
  • 1 篇 univ lausanne ch...
  • 1 篇 univ manitoba de...
  • 1 篇 ecole polytech f...
  • 1 篇 ut hlth sci ctr ...
  • 1 篇 univ calif san d...
  • 1 篇 sejong univ conv...
  • 1 篇 princeton univ p...

作者

  • 2 篇 jiang xiaoqian
  • 2 篇 mohammed noman
  • 2 篇 schneider johann...
  • 2 篇 mitchell john c.
  • 2 篇 toro federico gr...
  • 2 篇 oppermann alexan...
  • 2 篇 seifert jean-pie...
  • 2 篇 sadat md nazmus
  • 2 篇 ruan yefeng
  • 2 篇 haas zygmunt j.
  • 2 篇 zimmerman joe
  • 2 篇 thiel florian
  • 2 篇 durresi arjan
  • 1 篇 klemsa jakub
  • 1 篇 al-asli m.
  • 1 篇 lee ruby b.
  • 1 篇 huang jiwu
  • 1 篇 zhubin chen
  • 1 篇 sriram n. premna...
  • 1 篇 liao da-yin

语言

  • 37 篇 英文
  • 1 篇 中文
检索条件"主题词=Secure Cloud Computing"
38 条 记 录,以下是1-10 订阅
排序:
Implementation of Data Mining on a secure cloud computing over a Web API using Supervised Machine Learning Algorithm Data Mining in a secure cloud computing Environment through Restful API
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2022年 第5期13卷 1-4页
作者: Ige, Tosin Sikiru, Adewale Univ Texas El Paso Dept Comp Sci El Paso TX 79968 USA Virginia Technol Univ Dept Comp Sci Blacksburg VA USA
Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advan... 详细信息
来源: 评论
Blockchain as a Platform for secure cloud computing Services  22
Blockchain as a Platform for Secure Cloud Computing Services
收藏 引用
22nd IEEE International Conference on Advanced Communication Technology (ICACT)
作者: Tsai, Wang-You Chou, Tzu-Chuan Chen, Jiann-Liang Ma, Yi-Wei Huang, Chen-Jui Natl Taiwan Univ Sci & Technol Dept Informat Management Taipei Taiwan Natl Taiwan Univ Sci & Technol Dept Elect Engn Taipei Taiwan
Problems related to privacy and cyber-attacks have increased in recent years as a result of the rapid development of cloud computing. This work concerns secure cloud computing services on a blockchain platform, called... 详细信息
来源: 评论
secure cloud computing: Continuous Anomaly Detection Approach in Legal Metrology
Secure Cloud Computing: Continuous Anomaly Detection Approac...
收藏 引用
IEEE International Instrumentation and Measurement Technology Conference (I2MTC) - Discovering New Horizons in Instrumentation and Measurement
作者: Oppermann, Alexander Toro, Federico Grasso Thiel, Florian Seifert, Jean-Pierre Physikal Tech Bundesanstalt PTB Dept Metrol IT 85 Berlin Germany Tech Univ Berlin Secur Telecommunicat Berlin Germany
In the field of Legal Metrology, it shall be assured that all measurements are carried out by a trusted computer system. Securing Computer Systems, especially in a distributed environment can be a challenging task to ... 详细信息
来源: 评论
On the Security of Homomorphic Encryption Schemes with Restricted Decryption Oracles
收藏 引用
Journal of Systems Science & Complexity 2024年 第5期37卷 2240-2261页
作者: MA Guangsheng LI Hongbo School of Mathematics and Physics North China Electric Power UniversityBeijing 100096China Academy of Mathematics and Systems Science Chinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 100049China
Fully homomorphic encryption(FHE)can be used for privacy-preserving aggregation of medical *** this typical application,the security against passive attacks has been well studied by Li and Micciancio(2021).In this pap... 详细信息
来源: 评论
Juliet: A Configurable Processor for computing on Encrypted Data
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2024年 第9期73卷 2335-2349页
作者: Gouert, Charles Mouris, Dimitris Tsoutsos, Nektarios Georgios Univ Delaware Dept Elect & Comp Engn Newark DE 19716 USA
Fully homomorphic encryption (FHE) has become progressively more viable in the years since its original inception in 2009. At the same time, leveraging state-of-the-art schemes in an efficient way for general computat... 详细信息
来源: 评论
Efficient FHE-Based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND secure computing 2024年 第5期21卷 4451-4468页
作者: Lam, Kwok-Yan Lu, Xianhui Zhang, Linru Wang, Xiangning Wang, Huaxiong Goh, Si Qi Nanyang Technol Univ Sch Comp Sci & Engn Singapore 639798 Singapore Nanyang Technol Univ Singapore 639798 Singapore Nanyang Technol Univ Div Math Sci Singapore 639798 Singapore Chinese Acad Sci Inst Informat Engn Beijing 100045 Peoples R China
AI-as-a-Service has emerged as an important trend for supporting the growth of the digital economy. Digital service providers make use of their vast amount of customer data to train AI models (such as image recognitio... 详细信息
来源: 评论
secure Deep Learning Framework for Moving Object Detection in Compressed Video
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND secure computing 2024年 第4期21卷 2836-2851页
作者: Tian, Xianhao Zheng, Peijia Huang, Jiwu Shenzhen Univ Coll Informat Engn Shenzhen 518052 Guangdong Peoples R China Sun Yat Sen Univ Sch Comp Sci & Engn Guangdong Prov Key Lab Informat Secur Technol Guangzhou 510006 Guangdong Peoples R China Shenzhen Univ Guangdong Key Lab Intelligent Informat Proc Shenzhen Key Lab Media Secur Shenzhen 518052 Guangdong Peoples R China Shenzhen Inst Artificial Intelligence & Robot Soc Shenzhen 518172 Guangdong Peoples R China
In the cloud, there is an urgent need to implement intelligent video surveillance in a privacy-preserving way. Moving object detection is an important task in the intelligent surveillance system. In this article, we p... 详细信息
来源: 评论
secure computing Enclaves Using FPGAs
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND secure computing 2021年 第2期18卷 593-604页
作者: Elrabaa, M. E. S. Al-Asli, M. Abu-Amara, M. King Fahd Univ Petr & Minerals Comp Engn Dept Dhahran 31261 Saudi Arabia
A new scheme for securing users' data and applications in public clouds and data centers using Field Programmable Gate Arrays (FPGAs) has been developed. This scheme incorporates all necessary protocols, hardware,... 详细信息
来源: 评论
Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND secure computing 2023年 第1期20卷 114-130页
作者: Chamani, Javad Ghareh Wang, Yun Papadopoulos, Dimitrios Zhang, Mingyang Jalili, Rasool Hong Kong Univ Sci & Technol Dept Comp Sci & Engn Hong Kong Peoples R China Sharif Univ Technol Dept Comp Engn Tehran Iran Huawei Technol Poisson Lab Beijing 518129 Peoples R China
We study the problem of multi-user dynamic searchable symmetric encryption (DMUSSE) where a data owner stores its encrypted documents on an untrusted remote server and wishes to selectively allow multiple users to acc... 详细信息
来源: 评论
Efficient and secure MPC Through Integration of FHE and Proxy Re-encryption
收藏 引用
SN Computer Science 2025年 第2期6卷 1-10页
作者: Upadhyay, Rohitkumar R. Padhye, Sahadeo Motilal Nehru National Institute of Technology Allahabad Uttar Pradesh Prayagraj 211004 India
secure multi-party computation (MPC) protocols play a crucial role in facilitating collaboration among distrustful parties while safeguarding individual privacy. Traditional MPC protocols rely on private communication... 详细信息
来源: 评论