共 50 条
- [31] Data Integrity and Availability Verification Game in Untrusted Cloud Storage DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 287 - 306
- [32] Integrating XML data sources using approximate joins ACM TRANSACTIONS ON DATABASE SYSTEMS, 2006, 31 (01): : 161 - 207
- [34] An Accurate, Flexible and Private Trajectory-Based Contact Tracing System on Untrusted Servers INFORMATION INTEGRATION AND WEB INTELLIGENCE, IIWAS 2022, 2022, 13635 : 409 - 414
- [35] Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 125 - 134
- [36] Speeding up Exponentiation using an Untrusted Computational Resource Designs, Codes and Cryptography, 2006, 39 : 253 - 273
- [38] Approximate algorithms for document placement in distributed web servers I-SPAN 2004: 7TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2004, : 61 - 66