咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 网络空间安全
    • 1 篇 电子科学与技术(可...

主题

  • 4 篇 outsourced compu...
  • 2 篇 cloud computing
  • 1 篇 image steganalys...
  • 1 篇 forward secure
  • 1 篇 symmetric encryp...
  • 1 篇 ownership transf...
  • 1 篇 fully homomorphi...
  • 1 篇 provable data po...
  • 1 篇 smart contract
  • 1 篇 histogram featur...
  • 1 篇 chameleon hash
  • 1 篇 blockchain
  • 1 篇 searchable encry...
  • 1 篇 turing machine

机构

  • 1 篇 beijing national...
  • 1 篇 东南大学
  • 1 篇 beijing universi...
  • 1 篇 department of cy...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 school of commun...
  • 1 篇 university of no...
  • 1 篇 tsinghua univers...

作者

  • 1 篇 yanli ren
  • 1 篇 jianwei li
  • 1 篇 yubo luo
  • 1 篇 胡爱群
  • 1 篇 yining qi
  • 1 篇 dawu gu
  • 1 篇 xinpeng zhang
  • 1 篇 qingqing gan
  • 1 篇 xiaoming wang
  • 1 篇 zhen yang
  • 1 篇 xing li
  • 1 篇 guorui feng
  • 1 篇 方昊
  • 1 篇 yongfeng huang

语言

  • 3 篇 英文
  • 1 篇 中文
检索条件"主题词=outsourced computation"
4 条 记 录,以下是1-10 订阅
排序:
A secure outsourced Turing- equivalent computation scheme against semi-honest workers using fully homomorphic encryption
收藏 引用
Journal of Southeast University(English Edition) 2016年 第3期32卷 267-271页
作者: 方昊 胡爱群 东南大学信息科学与工程学院 南京210096
A scheme that can realize homomorphic Turing- equivalent privacy-preserving computations is proposed, where the encoding of the Turing machine is independent of its inputs and running time. Several extended private in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
收藏 引用
Frontiers of Computer Science 2023年 第5期17卷 165-177页
作者: Jianwei LI Xiaoming WANG Qingqing GAN Department of Information Science and Technology Jinan UniversityGuangzhou 510632China Department of Cyber Security Guangdong University of Foreign StudiesGuangzhou 510006China
When one enterprise acquires another,the electronic data of the acquired enterprise will be transferred to the acquiring *** particular,if the data system of acquired enterprise contains a searchable encryption mechan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices
收藏 引用
Computers, Materials & Continua 2022年 第11期73卷 2205-2221页
作者: Yining Qi Zhen Yang Yubo Luo Yongfeng Huang Xing Li Tsinghua University Beijing100084China Beijing National Research Center for Information Science and Technology Beijing100084China Beijing University of Posts and Telecommunications Beijing100084China University of North Carolina at Chapel Hill North Carolina27599USA
Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without ***,with the emerging of network consisting of low performance device... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient outsourced extraction of histogram features over encrypted images in cloud
收藏 引用
Science China(Information Sciences) 2021年 第3期64卷 232-234页
作者: Yanli REN Xinpeng ZHANG Dawu GU Guorui FENG School of Communication and Information Engineering Shanghai University Department of Computer Science and Engineering Shanghai Jiao Tong University
Dear editor,JPEG steganalysis mainly includes feature extraction and classification [1, 2], and thus the quality of the extracted features has an important influence on the detection performance of classifiers. With t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论