共 24 条
[1]
Atallah M.J., Li J., Secure outsourcing of sequence comparisons, International Journal of Information Security, 4, 4, pp. 277-287, (2005)
[2]
Atallah M.J., Pantazopoulos K.N., Rice J.R., Spafford E.H., Secure outsourcing of scientific computations, Advances in Computers, 54, pp. 216-272, (2001)
[3]
Belenkiy M., Chase M., Erway C.C., Jannotti J., Kupcu A., Lysyanskaya A., Incentivizing outsourced computation, NetEcon'08, pp. 85-90, (2008)
[4]
Benjamin D., Atallah M.J., Private and cheating-free outsourcing of algebraic computations, Proceedings of 6th Conference on Privacy, Security, and Trust (PST), pp. 240-245, (2008)
[5]
Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, (2009)
[6]
Cramer R., Damgard I., Maurer U., General secure multi-party computation from any linear secret-sharing scheme, EUROCRYPT, 1807, pp. 316-334, (2000)
[7]
Gennaro R., Gentry C., Parno B., Non-interactive verifiable computing: Outsourcing computation to untrusted workers, CRYPTO 2010, 6223, pp. 465-482, (2010)
[8]
Gennaro R., Rabin M.O., Rabin T., Simplified VSS and fast-track multiparty computations with applications to threshold cryptography, Proceedings of the 17th Annual ACM Symposium on Principles of Distributed Computing, pp. 101-111, (1998)
[9]
Gentry C., Fully homomorphic encryption using ideal lattices, Proceedings of STOC, pp. 169-178, (2009)
[10]
Gentry C., Computing arbitrary functions of encrypted data, Communications of the ACM, 53, 3, pp. 97-105, (2010)