共 52 条
- [1] Abadi M(1989)On hiding information from an oracle J. Comput. Syst. Sci. 39 21-50
- [2] Feigenbaum J(2002)Secure outsourcing of scientific computations Adv. Comput. 54 215-272
- [3] Kilian J(1997)Locally random reductions: Improvements and applications J. Cryptol. 10 17-36
- [4] Atallah MJ(1991)Program result checking against adaptive programs and in cryptographic settings DIMACS Ser. Discrete Math. Theor. Comput. Sci. 2 107-118
- [5] Pantazopoulos KN(2014)Semantic link network-based model for organizing multimedia big data IEEE Trans. Emerg. Top. Comput. 2 376-387
- [6] Rice JR(2014)Digital provenance: enabling secure data forensics in cloud computing Future Gener. Comput. Syst. 37 259-266
- [7] Spafford EH(2014)Privacy-preserving data utilization in hybrid clouds Future Gener. Comput. Syst. 30 98-106
- [8] Beaver D(2001)Distribution of modular sums and the security of the server aided exponentiation Cryptogr. Comput. Number Theory 20 331-342
- [9] Feigenbaum J(1997)On schnorr’s preprocessing for digital signature schemes J. Cryptol. 10 1-16
- [10] Kilian J(2011)A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1-11