共 50 条
- [31] Feasibility and Infeasibility of Secure Computation with Malicious PUFs Journal of Cryptology, 2020, 33 : 595 - 617
- [33] Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 71 - 82
- [34] Secure Outsourcing of Matrix Operations as a Service 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 918 - 925
- [37] Malicious Computation Prevention Protocol for Secure Multi-Party Computation TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
- [38] Secure KNN Computation on Cloud INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 197 - 216
- [39] A Fast and Secure Scheme for Data Outsourcing in the Cloud KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2708 - 2721
- [40] Practical and Secure Outsourcing of Linear Algebra in the Cloud 2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2013, : 81 - 87