咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 42 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 38 篇 工学
    • 34 篇 计算机科学与技术...
    • 13 篇 电气工程
    • 13 篇 信息与通信工程
    • 3 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
  • 4 篇 理学
    • 3 篇 数学
    • 1 篇 化学
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...

主题

  • 42 篇 verifiable compu...
  • 7 篇 blockchain
  • 5 篇 security
  • 4 篇 cloud computing
  • 4 篇 privacy
  • 3 篇 outsourcing comp...
  • 3 篇 homomorphic encr...
  • 3 篇 smart contract
  • 3 篇 trust
  • 3 篇 trusted executio...
  • 2 篇 outsourcing
  • 2 篇 vehicular cloud
  • 2 篇 task analysis
  • 2 篇 computational ef...
  • 2 篇 neural networks
  • 2 篇 privacy-preservi...
  • 2 篇 information theo...
  • 2 篇 state machine ex...
  • 2 篇 byzantine faults
  • 2 篇 machine learning

机构

  • 2 篇 qualcomm technol...
  • 1 篇 fudan univ sch c...
  • 1 篇 univ new brunswi...
  • 1 篇 univ ontario ins...
  • 1 篇 natl inst techno...
  • 1 篇 univ lisbon ines...
  • 1 篇 beihang univ sch...
  • 1 篇 ryerson univ dep...
  • 1 篇 sungshin womens ...
  • 1 篇 hunan univ sch c...
  • 1 篇 zhongnan univ ec...
  • 1 篇 faculty of busin...
  • 1 篇 guangzhou univ s...
  • 1 篇 hangzhou normal ...
  • 1 篇 univ waterloo de...
  • 1 篇 university of so...
  • 1 篇 yiwu res inst fu...
  • 1 篇 nanyang technol ...
  • 1 篇 taras shevchenko...
  • 1 篇 univ southern ca...

作者

  • 3 篇 sahraei saeid
  • 2 篇 ali ramy e.
  • 2 篇 avestimehr salma...
  • 2 篇 wang guojun
  • 2 篇 avestimehr a. sa...
  • 2 篇 zhou lei
  • 1 篇 xu zifeng
  • 1 篇 huang cheng
  • 1 篇 songze li
  • 1 篇 lin xiaodong
  • 1 篇 hao hu
  • 1 篇 chakraborty part...
  • 1 篇 wei yuntao
  • 1 篇 zhou jingyu
  • 1 篇 huber nicolas
  • 1 篇 maddali lakshmi ...
  • 1 篇 wang jing
  • 1 篇 yu mingchao
  • 1 篇 aldweesh amjad
  • 1 篇 nabi mahmudun

语言

  • 41 篇 英文
  • 1 篇 其他
检索条件"主题词=Verifiable computing"
42 条 记 录,以下是1-10 订阅
排序:
verifiable computing in Avionics for Assuring Computer-Integrity without Replication  42
Verifiable Computing in Avionics for Assuring Computer-Integ...
收藏 引用
IEEE/AIAA 42nd Digital Avionics Systems Conference (DASC)
作者: Reinhart, Johannes Luettig, Bastian Huber, Nicolas Liedtke, Julian Annighoefer, Bjoern Univ Stuttgart Inst Aircraft Syst Stuttgart Germany Univ Stuttgart Inst Informat Secur Stuttgart Germany
Safety-critical digital systems such as Fly-by-wire control have demanding integrity and availability requirements which significantly exceed the occurrence rates of random hardware faults observed in digital computer... 详细信息
来源: 评论
A verifiable computing Scheme for Encrypted Control Systems
收藏 引用
IEEE CONTROL SYSTEMS LETTERS 2024年 8卷 1096-1101页
作者: Stabile, Francesca Lucia, Walter Youssef, Amr Franze, Giuseppe Univ Calabria DIMEG I-87036 Arcavacata Di Rende Italy Concordia Univ Concordia Inst Informat Syst Engn Montreal PQ H3G 2W1 Canada
The proliferation of cloud computing technologies has paved the way for deploying networked encrypted control systems, offering high performance, remote accessibility and privacy. However, in scenarios where the contr... 详细信息
来源: 评论
verifiable computing Applications in Blockchain
收藏 引用
IEEE ACCESS 2021年 9卷 156729-156745页
作者: Simunic, Silvio Bernaca, Dalen Lenac, Kristijan Univ Rijeka Fac Engn Rijeka 51000 Croatia Univ Rijeka Ctr Artificial Intelligence & Cybersecur Rijeka 51000 Croatia
From weak clients outsourcing computational tasks to more powerful machines, to distributed blockchain nodes needing to agree on the state of the ledger in the presence of adversarial nodes, there is a growing need to... 详细信息
来源: 评论
VeriBlock: A novel blockchain framework based on verifiable computing and trusted execution environment
VeriBlock: A novel blockchain framework based on verifiable ...
收藏 引用
International Conference on COMmunication Systems and NETworkS (COMSNETS)
作者: Maddali, Lakshmi Padmaja Thakur, Meena Singh Dilip Vigneswaran, R. Rajan, M. A. Kanchanapalli, Srujana Das, Batsayan TCS Res & Innovat Mumbai Maharashtra India
Many enterprise (permissioned) blockchain applications demand low latency to commit their transactions on the ledger. One way to reduce latency is by reducing the number of peers required to execute/endorse a transact... 详细信息
来源: 评论
computing Neural Networks with Homomorphic Encryption and verifiable computing  2nd
Computing Neural Networks with Homomorphic Encryption and Ve...
收藏 引用
18th International Conference on Applied Cryptography and Network Security (ACNS)
作者: Madi, Abbass Sirdey, Renaud Stan, Oana CEA LIST Point Courrier 172 F-91191 Gif Sur Yvette France
The widespread use of machine learning and in particular of Artificial Neural Networks (ANN) raises multiple security and data privacy issues. Recent works propose to preserve data confidentiality during the inference... 详细信息
来源: 评论
Adaptive verifiable Coded computing: Towards Fast, Secure and Private Distributed Machine Learning  36
Adaptive Verifiable Coded Computing: Towards Fast, Secure an...
收藏 引用
36th IEEE International Parallel and Distributed Processing Symposium (IEEE IPDPS)
作者: Tang, Tingting Ali, Ramy E. Hashemi, Hanieh Gangwani, Tynan Avestimehr, Salman Annavaram, Murali Univ Southern Calif Comp Sci Dept Los Angeles CA 90007 USA Univ Southern Calif Elect Engn Dept Los Angeles CA 90007 USA
Stragglers, Byzantine workers, and data privacy are the main bottlenecks in distributed cloud computing. Some prior works proposed coded computing strategies to jointly address all three challenges. They require eithe... 详细信息
来源: 评论
Leveraging ARM TrustZone and verifiable computing to Provide Auditable Mobile Functions  18
Leveraging ARM TrustZone and Verifiable Computing to Provide...
收藏 引用
15th EAI International Conference on Mobile and Ubiquitous Systems - computing, Networking and Services (Mobiquitous)
作者: Duarte, Nuno O. Yalew, Sileshi Demesie Santos, Nuno Correia, Miguel Univ Lisbon INESC ID IST Lisbon Portugal KTH Royal Inst Technol Stockholm Sweden
The increase of personal data on mobile devices has been followed by legislation that forces service providers to process and maintain users' data under strict data protection policies. In this paper, we propose a... 详细信息
来源: 评论
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for verifiable Cloud computing  17
Betrayal, Distrust, and Rationality: Smart Counter-Collusion...
收藏 引用
24th ACM-SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Dong, Changyu Wang, Yilei Aldweesh, Amjad McCorry, Patrick van Moorsel, Aad Newcastle Univ Newcastle Upon Tyne Tyne & Wear England UCL London England
Cloud computing has become an irreversible trend. Together comes the pressing need for verifiability, to assure the client the correctness of computation outsourced to the cloud. Existing verifiable computation techni... 详细信息
来源: 评论
Verifiability for privacy-preserving computing on distributed data - a survey
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2025年 第3期24卷 1-39页
作者: Bontekoe, Tariq Karastoyanova, Dimka Turkmen, Fatih Univ Groningen Groningen Netherlands
Privacy-preserving computation (PPC) solutions, such as secure multiparty computation (MPC) and homomorphic encryption (HE), are deployed increasingly often to guarantee data confidentiality for computations over priv... 详细信息
来源: 评论
VeriEdge: Verifying and Enforcing Service Level Agreements for Pervasive Edge computing
VeriEdge: Verifying and Enforcing Service Level Agreements f...
收藏 引用
IEEE Conference on Computer Communications (IEEE INFOCOM)
作者: Wang, Xiaojian Yu, Ruozhou Yang, Dejun Gu, Huayue Li, Zhouyu NC State Univ Raleigh NC 27606 USA Colorado Sch Mines Golden CO 80401 USA
Edge computing gained popularity for its promises of low latency and high-quality computing services to users. However, it has also introduced the challenge of mutual untrust between user and edge devices for service ... 详细信息
来源: 评论