Token-Based Cloud Computing (original) (raw)
Related papers
International Journal of Cloud Applications and Computing, 2019
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing
Juan Manuel Navarrete Quintero
Lecture Notes in Computer Science, 2019
Computation Certification as a Service in the Cloud
2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, 2013
Secure Computation for Cloud data Storage
IACR Cryptology ePrint Archive , 709, 2019
Secure Outsourced Computation in a Multi-tenant Cloud
Practical Secure Computation Outsourcing
ACM Computing Surveys, 2019
Delegatable homomorphic encryption with applications to secure outsourcing of computation
2012
Towards a Marketplace for Secure Outsourced Computations
2019
Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
International Journal of Information Security, 2015
Efficient Techniques for Publicly Verifiable Delegation of Computation
2016
Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing
2016
Secure Auditing For Outsourced Data in CloudUsing Homomorphic Token and Erasure Code
International Journal of Innovative Research in Computer and Communication Engineering, 2014
Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud
International Journal Of engineering and Computer Science (IJECS)
On the impossibility of cryptography alone for privacy-preserving cloud computing
… USENIX conference on Hot topics in security, 2010
Towards Trusted Cloud Computing
Secure Data Processing in the Cloud
2017
VERIFIABLE COMPUTATIONS: APPROACHES AND PERSPECTIVES
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
Fair Marketplace for Secure Outsourced Computations
Cornell University - arXiv, 2018
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering, 2013
Cryptography goes to the cloud
2011
Secure Cloud Computing through Homomorphic Encryption
2014
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes
Lecture Notes in Computer Science, 2012
On the use of homomorphic encryption to secure cloud computing, services, and routing protocols
ArXiv, 2015
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
Ensuring Data Security in Cloud Computing using Homomorphic Encryption
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Outsourcing Secure Two-Party Computation as a Black Box
Lecture Notes in Computer Science, 2015
On the Security of Practical and Complete Homomorphic Encrypted Computation
IACR Cryptol. ePrint Arch., 2016
Homomorphic Encryption Algorithms and Schemes for Secure Computations in the Cloud
ICSCT 2016 - International Conference on Secure Computation and Technology, Virginia International University, Fairfax, VA , 2016
Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys
International Journal of Communication Networks and Distributed Systems, 2015