Token-Based Cloud Computing (original) (raw)

An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms

Adedamola Dada

International Journal of Cloud Applications and Computing, 2019

View PDFchevron_right

Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing

Juan Manuel Navarrete Quintero

Lecture Notes in Computer Science, 2019

View PDFchevron_right

Computation Certification as a Service in the Cloud

Safwan Khan

2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, 2013

View PDFchevron_right

Secure Computation for Cloud data Storage

Davood Rezaeipour

IACR Cryptology ePrint Archive , 709, 2019

View PDFchevron_right

Secure Outsourced Computation in a Multi-tenant Cloud

Seny Kamara

View PDFchevron_right

Practical Secure Computation Outsourcing

zihao shan

ACM Computing Surveys, 2019

View PDFchevron_right

Delegatable homomorphic encryption with applications to secure outsourcing of computation

Manuel Barbosa

2012

View PDFchevron_right

Towards a Marketplace for Secure Outsourced Computations

Dat Le Tien

2019

View PDFchevron_right

Efficient and verifiable algorithms for secure outsourcing of cryptographic computations

Mehmet Sabir Kiraz

International Journal of Information Security, 2015

View PDFchevron_right

Efficient Techniques for Publicly Verifiable Delegation of Computation

Refik Molva

2016

View PDFchevron_right

Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing

Stefan Rass

2016

View PDFchevron_right

Secure Auditing For Outsourced Data in CloudUsing Homomorphic Token and Erasure Code

sounder rajan

International Journal of Innovative Research in Computer and Communication Engineering, 2014

View PDFchevron_right

Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud

International Journal Of engineering and Computer Science (IJECS)

View PDFchevron_right

On the impossibility of cryptography alone for privacy-preserving cloud computing

Shaga Praveen

… USENIX conference on Hot topics in security, 2010

View PDFchevron_right

Towards Trusted Cloud Computing

Rodrigo Rodrigues

View PDFchevron_right

Secure Data Processing in the Cloud

Mike Surridge

2017

View PDFchevron_right

VERIFIABLE COMPUTATIONS: APPROACHES AND PERSPECTIVES

IAEME Publication

View PDFchevron_right

Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

Yudong Zhang

View PDFchevron_right

Fair Marketplace for Secure Outsourced Computations

Dat Le Tien

Cornell University - arXiv, 2018

View PDFchevron_right

Fully homomorphic encryption equating to cloud security: An approach

Bhabendu Mohanta

IOSR Journal of Computer Engineering, 2013

View PDFchevron_right

Cryptography goes to the cloud

Isaac Agudo

2011

View PDFchevron_right

Secure Cloud Computing through Homomorphic Encryption

Said El Hajji

2014

View PDFchevron_right

Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes

Willy Susilo

Lecture Notes in Computer Science, 2012

View PDFchevron_right

On the use of homomorphic encryption to secure cloud computing, services, and routing protocols

zouhair guennoun

ArXiv, 2015

View PDFchevron_right

Secure and Practical Outsourcing of Linear Programming in Cloud Computing

Abhilash S Abhi

View PDFchevron_right

Ensuring Data Security in Cloud Computing using Homomorphic Encryption

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020

View PDFchevron_right

Outsourcing Secure Two-Party Computation as a Black Box

Henry Carter

Lecture Notes in Computer Science, 2015

View PDFchevron_right

IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. X, NO. X, XXXX 201X Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Satish Andrew

View PDFchevron_right

On the Security of Practical and Complete Homomorphic Encrypted Computation

Jonathan Bowen

IACR Cryptol. ePrint Arch., 2016

View PDFchevron_right

Homomorphic Encryption Algorithms and Schemes for Secure Computations in the Cloud

Majedah Alkharji

ICSCT 2016 - International Conference on Secure Computation and Technology, Virginia International University, Fairfax, VA , 2016

View PDFchevron_right

Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys

Iti Sharma

International Journal of Communication Networks and Distributed Systems, 2015

View PDFchevron_right