咨询与建议

限定检索结果

文献类型

  • 28 篇 期刊文献
  • 21 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 50 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 43 篇 计算机科学与技术...
    • 28 篇 电气工程
    • 12 篇 信息与通信工程
    • 10 篇 软件工程
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 物理学

主题

  • 50 篇 computation outs...
  • 27 篇 cloud computing
  • 6 篇 security
  • 5 篇 outsourcing
  • 5 篇 privacy-preservi...
  • 5 篇 linear programmi...
  • 5 篇 servers
  • 3 篇 data security
  • 3 篇 data privacy
  • 3 篇 task analysis
  • 3 篇 optimization
  • 3 篇 protocols
  • 3 篇 confidential dat...
  • 3 篇 storage outsourc...
  • 2 篇 homomorphic encr...
  • 2 篇 client-server sy...
  • 2 篇 efficiency
  • 2 篇 verifiability
  • 2 篇 face recognition
  • 2 篇 computational mo...

机构

  • 7 篇 qingdao univ col...
  • 4 篇 shenzhen technol...
  • 4 篇 qingdao univ sci...
  • 3 篇 chinese acad sci...
  • 2 篇 kuet dept comp s...
  • 2 篇 xidian univ sch ...
  • 2 篇 chongqing univ c...
  • 2 篇 suny buffalo dep...
  • 2 篇 harbin inst tech...
  • 2 篇 iit dept elect &...
  • 2 篇 deakin univ sch ...
  • 2 篇 univ hong kong p...
  • 2 篇 city univ hong k...
  • 2 篇 dalian univ tech...
  • 2 篇 nanjing univ aer...
  • 2 篇 chinese univ hon...
  • 2 篇 michigan state u...
  • 1 篇 virginia polytec...
  • 1 篇 city univ hong k...
  • 1 篇 univ melbourne d...

作者

  • 6 篇 tian chengliang
  • 5 篇 ren kui
  • 5 篇 wang cong
  • 5 篇 tian weizhong
  • 4 篇 yu jia
  • 4 篇 hashem m. m. a.
  • 4 篇 zhang yan
  • 3 篇 zhou kai
  • 3 篇 ferdush jannatul
  • 3 篇 ren jian
  • 3 篇 zhang hanlin
  • 2 篇 yiu s. m.
  • 2 篇 lv jiazhuo
  • 2 篇 xiang yong
  • 2 篇 wu yulin
  • 2 篇 chen fei
  • 2 篇 wang lingyu
  • 2 篇 li fengjun
  • 2 篇 wang xuan
  • 2 篇 wang qian

语言

  • 50 篇 英文
检索条件"主题词=computation outsourcing"
50 条 记 录,以下是1-10 订阅
排序:
Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing
收藏 引用
INFORMATION SCIENCES 2020年 第0期518卷 168-180页
作者: Jiang, Zoe L. Guo, Ning Jin, Yabin Lv, Jiazhuo Wu, Yulin Liu, Zechao Fang, Junbin Yiu, S. M. Wang, Xuan Harbin Inst Technol Shenzhen Shenzhen 518055 Peoples R China Jinan Univ Optoelect Engn Guangzhou 510632 Peoples R China Univ Hong Kong Hong Kong 999077 Peoples R China Harbin Engn Univ Harbin 150001 Peoples R China
Nowadays, cloud computing has developed well and been applied in many kinds of areas. However, privacy is still the most challenging problem which obstructs it being applied in some privacy-sensitive fields, such as f... 详细信息
来源: 评论
Efficient computation outsourcing for inverting a class of homomorphic functions
收藏 引用
INFORMATION SCIENCES 2014年 286卷 19-28页
作者: Zhang, Fangguo Ma, Xu Liu, Shengli Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510006 Guangdong Peoples R China Guangdong Power Grid Corp Informat Ctr Guangzhou 510060 Guangdong Peoples R China Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China
The rise of cloud computing and the proliferation of mobile devices make computation outsourcing popular. However, the servers are not fully trusted, and a critical problem is the verifiability and privacy of such com... 详细信息
来源: 评论
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 2014年 第3期74卷 2141-2151页
作者: Chen, Fei Xiang, Tao Yang, Yuanyuan Chinese Univ Hong Kong Dept Comp Sci & Engn Hong Kong Hong Kong Peoples R China Chongqing Univ Coll Comp Sci Chongqing 630044 Peoples R China SUNY Stony Brook Dept Elect & Comp Engn Stony Brook NY 11794 USA
computation outsourcing to the cloud has become a popular application in the age of cloud computing. Recently, two protocols for secure outsourcing scientific computations, i.e., linear equation solving and linear pro... 详细信息
来源: 评论
Secure Optimization computation outsourcing in Cloud Computing: A Case Study of Linear Programming
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2016年 第1期65卷 216-229页
作者: Wang, Cong Ren, Kui Wang, Jia City Univ Hong Kong Dept Comp Sci Kowloon Hong Kong Peoples R China SUNY Buffalo Dept Comp Sci & Engn CSE Buffalo NY 14260 USA IIT Dept Elect & Comp Engn Chicago IL 60616 USA
Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming the major security ... 详细信息
来源: 评论
Addition of Fake Variable to Enrich Secure Linear Programming computation outsourcing in the Cloud
Addition of Fake Variable to Enrich Secure Linear Programmin...
收藏 引用
International Conference on Computing, Analytics and Security Trends (CAST)
作者: Ahire, Pallavi Abraham, Jibi Savitribai Phule Pune Univ Dept Technol Pune Maharashtra India Coll Engn Pune Pune Maharashtra India
Cloud computing plays a vital role in today's IT industry, as it offers tremendous computing and storage facilities for the tasks and outsourced data respectively. The major security concern during the computation... 详细信息
来源: 评论
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and computation outsourcing  18th
Efficient Two-Party Privacy Preserving Collaborative <i>k</i...
收藏 引用
18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Jiang, Zoe L. Guo, Ning Jin, Yabin Lv, Jiazhuo Wu, Yulin Yu, Yating Wang, Xuan Yiu, S. M. Fang, Junbin Harbin Inst Technol Shenzhen Shenzhen 518055 Peoples R China Univ Hong Kong Hong Kong Peoples R China Jinan Univ Guangzhou Peoples R China
Privacy preserving collaborative data mining aims to extract useful knowledge from distributed databases owned by multiple parties while keeping the privacy of both data and mining result. Nowadays, more and more comp... 详细信息
来源: 评论
Cloudroid: A Cloud Framework for Transparent and QoS-aware Robotic computation outsourcing  10
Cloudroid: A Cloud Framework for Transparent and QoS-aware R...
收藏 引用
10th IEEE International Conference on Cloud Computing (CLOUD)
作者: Hu, Ben Wang, Huaimin Zhang, Pengfei Ding, Bo Che, Huimin Natl Univ Def Technol Natl Key Lab Parallel & Distributed Proc Changsha 410073 Hunan Peoples R China
Many robotic tasks require heavy computation, which can easily exceed the robot's onboard computer capability. A promising solution to address this challenge is outsourcing the computation to the cloud. However, e... 详细信息
来源: 评论
Linearly Homomorphic Signature Based Secure computation outsourcing in Vehicular Adhoc Networks
Linearly Homomorphic Signature Based Secure Computation Outs...
收藏 引用
IEEE International Conference on Innovations in Power and Advanced Computing Technologies
作者: Vasudha Altaf, Fahiem Maity, Soumyadev Indian Inst Informat Technol Dept Informat Technol Allahabad Uttar Pradesh India
In vehicular adhoc network (VANET), periodic messages, known as beacons, are transmitted by vehicles to their neighboring vehicles and surrounding RSU to help them create a logical map of surrounding environment. For ... 详细信息
来源: 评论
CoOMO: Cost-efficient computation outsourcing with Multi-site Offloading for Mobile-Edge Services  16
CoOMO: Cost-efficient Computation Outsourcing with Multi-sit...
收藏 引用
16th IEEE International Conference on Mobility, Sensing and Networking (MSN)
作者: Meng, Tianhui Wu, Huaming Shang, Zhihao Zhao, Yubin Xu, Cheng-Zhong Chinese Acad Sci Shenzhen Inst Adv Technol Shenzhen Peoples R China Tianjin Univ Tianjin Peoples R China Free Univ Berlin Berlin Germany Univ Macau State Key Lab IoTSC Macau Peoples R China Univ Macau Dept Comp & Informat Sci Macau Peoples R China
Mobile phones and tablets are becoming the primary platform of choice. However, these systems still suffer from limited battery and computation resources. A popular technique in mobile edge systems is computing outsou... 详细信息
来源: 评论
Proof-Carrying Cloud computation: The Case of Convex Optimization
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2014年 第11期9卷 1790 - 1803页
作者: Xu, Zhen Wang, Cong Ren, Kui Wang, Lingyu Zhang, Bingsheng SUNY Buffalo Dept Comp Sci & Engn Buffalo NY 14260 USA City Univ Hong Kong Dept Comp Sci Hong Kong Hong Kong Peoples R China Concordia Univ Concordia Inst Informat Syst Engn Montreal PQ H3G 1M8 Canada Univ Athens Dept Informat & Telecommun Athens 15784 Greece
Cloud computing offers a great opportunity to bridge the gap between the fast growing computation needs and limited local resources. However, without the adequate trust and strong integrity assurance, it would be diff... 详细信息
来源: 评论