咨询与建议

限定检索结果

文献类型

  • 7 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 7 篇 计算机科学与技术...
    • 4 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 9 篇 secure distribut...
  • 2 篇 symbiosis
  • 2 篇 evolutionary com...
  • 2 篇 traffic engineer...
  • 2 篇 genetic algorith...
  • 2 篇 privacy
  • 1 篇 data privacy
  • 1 篇 fault tolerance
  • 1 篇 sdc
  • 1 篇 tee
  • 1 篇 auditing
  • 1 篇 non-equivocation
  • 1 篇 approximate comm...
  • 1 篇 symmetric cipher
  • 1 篇 order-preserving...
  • 1 篇 authenticity
  • 1 篇 multiparty compu...
  • 1 篇 fault-tolerance
  • 1 篇 cluster
  • 1 篇 secure vickrey a...

机构

  • 2 篇 univ adelaide ad...
  • 2 篇 univ texas austi...
  • 1 篇 int inst informa...
  • 1 篇 katholieke univ ...
  • 1 篇 texas a&m univ d...
  • 1 篇 inria uvsq versa...
  • 1 篇 katholieke univ ...
  • 1 篇 int inst informa...
  • 1 篇 univ leeds sch c...
  • 1 篇 univ huddersfiel...

作者

  • 2 篇 roughan matthew
  • 2 篇 piessens f
  • 2 篇 de decker b
  • 2 篇 neven g
  • 2 篇 choudhury ashish
  • 2 篇 zhang yin
  • 1 篇 zhao w
  • 1 篇 djemame karim
  • 1 篇 lam tc
  • 1 篇 ladjel riad
  • 1 篇 scerri guillaume
  • 1 篇 dyer james
  • 1 篇 bhadauria rishab...
  • 1 篇 liu jc
  • 1 篇 anciaux nicolas
  • 1 篇 shen yp
  • 1 篇 dyer martin
  • 1 篇 pucheral philipp...

语言

  • 9 篇 英文
检索条件"主题词=secure distributed computing"
9 条 记 录,以下是1-10 订阅
排序:
Brief Announcement: Asynchronous secure distributed computing with Transferrable Non-equivocation Revisited  18
Brief Announcement: Asynchronous Secure Distributed Computin...
收藏 引用
37th ACM SIGACT-SIGOPS Symposium on Principles of distributed computing (PODC)
作者: Bhadauria, Rishabh Choudhury, Ashish Int Inst Informat Technol Bangalore Bengaluru India
In this paper, we consider two fundamental problems in secure distributed computing, namely Asynchronous Byzantine Agreement (ABA) and Asynchronous secure Multi party Computation (ASMPC). Our focus is on the honest ma... 详细信息
来源: 评论
Trustworthy distributed Computations on Personal Data Using Trusted Execution Environments  18
Trustworthy Distributed Computations on Personal Data Using ...
收藏 引用
18th IEEE International Conference on Trust, Security and Privacy in computing and Communications (IEEE TrustCom) / 13th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE)
作者: Ladjel, Riad Anciaux, Nicolas Pucheral, Philippe Scerri, Guillaume INRIA UVSQ Versailles France
Thanks to new regulations like GDPR, Personal Data Management Systems (PDMS) have become a reality. This decentralized way of managing personal data provides a de facto protection against massive attacks on central se... 详细信息
来源: 评论
Order-preserving encryption using approximate common divisors
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019年 49卷
作者: Dyer, James Dyer, Martin Djemame, Karim Univ Huddersfield Dept Comp Sci Huddersfield HD1 3DH W Yorkshire England Univ Leeds Sch Comp Leeds LS2 9JT W Yorkshire England
Order-preservation is a highly desirable property for encrypted databases as it allows range queries over ciphertexts. Order-preserving encryption (OPE) is used in the encrypted database systems CryptDB and Cipherbase... 详细信息
来源: 评论
Multi-valued Asynchronous Reliable Broadcast with a Strict Honest Majority  17
Multi-valued Asynchronous Reliable Broadcast with a Strict H...
收藏 引用
18th International Conference on distributed computing and Networking (ICDCN)
作者: Choudhury, Ashish Int Inst Informat Technol 26-C Elect CityHosur Rd Bangalore 560100 Karnataka India
Asynchronous reliable broadcast is a fundamental primitive in secure distributed computing. In an asynchronous system of n mutually distrusting parties with t of them being Byzantine corrupted, reliable broadcast is p... 详细信息
来源: 评论
GATEway: symbiotic inter-domain traffic engineering
收藏 引用
TELECOMMUNICATION SYSTEMS 2011年 第1-2期47卷 3-17页
作者: Roughan, Matthew Zhang, Yin Univ Adelaide Adelaide SA Australia Univ Texas Austin Austin TX 78712 USA
There are a group of problems in networking that can most naturally be described as optimization problems (network design, traffic engineering, etc.). There has been a great deal of research devoted to solving these p... 详细信息
来源: 评论
GATEway: symbiotic inter-domain traffic engineering
GATEway: symbiotic inter-domain traffic engineering
收藏 引用
International Conference on Game Theory for Networks
作者: Roughan, Matthew Zhang, Yin Univ Adelaide Adelaide SA Australia Univ Texas Austin Austin TX 78712 USA
There are a group of problems in networking that can most naturally be described as optimization problems (network design, traffic engineering, etc.). There has been a great deal of research devoted to solving these p... 详细信息
来源: 评论
On the confidential auditing of distributed computing systems
On the confidential auditing of distributed computing system...
收藏 引用
24th International Conference on distributed computing Systems
作者: Shen, YP Lam, TC Liu, JC Zhao, W Texas A&M Univ Dept Comp Sci College Stn TX 77843 USA
In this paper, we propose a confidential logging and auditing service for distributed information systems. We propose a cluster-based TTP (trusted third party) architecture for the event log auditing services, so that... 详细信息
来源: 评论
On the practical feasibility of secure distributed computing - A case study
On the practical feasibility of secure distributed computing...
收藏 引用
16th International-Federation-for-Information-Processing World Computer Congress (IFIP 2000)/Annual Conference of TC11 (SEC 2000)
作者: Neven, G Piessens, F De Decker, B Katholieke Univ Leuven Dept Comp Sci B-3001 Louvain Belgium
secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants, in such a way that each of the participants has only limited access to the information... 详细信息
来源: 评论
secure vickrey auctions without a trusted third party - A prototype
收藏 引用
18th International Conference on Information Security
作者: De Decker, B Neven, G Piessens, F Katholieke Univ Leuven Dept Comp Sci B-3001 Heverlee Belgium
secure distributed computing addresses the problem of performing a computation with a number of mutually distrustful participants, ill such a way that each of the participants has only limited access to the informatio... 详细信息
来源: 评论