Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Verifiable computing“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Verifiable computing" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Verifiable computing"
Simunic, Silvio, Dalen Bernaca, and Kristijan Lenac. "Verifiable Computing Applications in Blockchain." IEEE Access 9 (2021): 156729–45. http://dx.doi.org/10.1109/access.2021.3129314.
Der volle Inhalt der QuelleYan, Zheng, Xixun Yu, and Wenxiu Ding. "Context-Aware Verifiable Cloud Computing." IEEE Access 5 (2017): 2211–27. http://dx.doi.org/10.1109/access.2017.2666839.
Der volle Inhalt der QuelleJeveriya, Anjum Dr Shameem Akhter. "CONTEXT AWARE VERIFIABLE CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 6 (2018): 33–56. https://doi.org/10.5281/zenodo.1336668.
Der volle Inhalt der QuelleSong, Beibei, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu, and Chuansheng Wang. "Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions." Future Internet 15, no. 4 (2023): 152. http://dx.doi.org/10.3390/fi15040152.
Der volle Inhalt der QuelleSun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu, and Qianhong Wu. "Confidentiality-Preserving Publicly Verifiable Computation." International Journal of Foundations of Computer Science 28, no. 06 (2017): 799–818. http://dx.doi.org/10.1142/s0129054117400196.
Der volle Inhalt der QuelleYao, Shuang, and Dawei Zhang. "An Anonymous Verifiable Random Function with Applications in Blockchain." Wireless Communications and Mobile Computing 2022 (April 19, 2022): 1–12. http://dx.doi.org/10.1155/2022/6467866.
Der volle Inhalt der QuelleZara, Maham, Shuzhen Wang, and Hasan Ul Moin. "Blockchain-Based Verifiable Computation: A Review." Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences 61, no. 2 (2024): 113–28. http://dx.doi.org/10.53560/ppasa(61-2)850.
Der volle Inhalt der QuelleJiao, Zi, Fucai Zhou, Qiang Wang, and Jintong Sun. "RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing." Sensors 22, no. 11 (2022): 4012. http://dx.doi.org/10.3390/s22114012.
Der volle Inhalt der QuelleWang, Jianfeng, Xiaofeng Chen, Xinyi Huang, Ilsun You, and Yang Xiang. "Verifiable Auditing for Outsourced Database in Cloud Computing." IEEE Transactions on Computers 64, no. 11 (2015): 3293–303. http://dx.doi.org/10.1109/tc.2015.2401036.
Der volle Inhalt der QuelleXu, Lingling, and Shaohua Tang. "Verifiable computation with access control in cloud computing." Journal of Supercomputing 69, no. 2 (2013): 528–46. http://dx.doi.org/10.1007/s11227-013-1039-z.
Der volle Inhalt der QuelleDissertationen zum Thema "Verifiable computing"
Madi, Abbass. "Secure Machine Learning by means of Homomorphic Encryption and Verifiable Computing." Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG019.
Der volle Inhalt der QuelleSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Der volle Inhalt der QuelleAzraoui, Monir. "Vérifiabilité et imputabilité dans le Cloud." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0032/document.
Der volle Inhalt der QuelleAzraoui, Monir. "Vérifiabilité et imputabilité dans le Cloud." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0032.
Der volle Inhalt der QuelleRathi, Nilesh. "Scaling Blockchains Using Coding Theory and Verifiable Computing." Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5203.
Der volle Inhalt der QuelleBücher zum Thema "Verifiable computing"
Demirel, Denise, Lucas Schabhüser, and Johannes Buchmann. Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6.
Der volle Inhalt der QuelleSchabhüser, Lucas, Johannes Buchmann, and Denise Demirel. Privately and Publicly Verifiable Computing Techniques: A Survey. Springer International Publishing AG, 2017.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Verifiable computing"
Xu, Cheng, Ce Zhang, and Jianliang Xu. "Verifiable Cloud Computing." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_299.
Der volle Inhalt der QuelleXu, Cheng, Ce Zhang, and Jianliang Xu. "Verifiable Cloud Computing." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_299-1.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Verifiable Computing for Specific Applications." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_7.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Proof and Argument Based Verifiable Computing." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_3.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Verifiable Computing from Fully Homomorphic Encryption." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_4.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Verifiable Computing Frameworks from Functional Encryption and Functional Signatures." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_6.
Der volle Inhalt der QuelleMadi, Abbass, Renaud Sirdey, and Oana Stan. "Computing Neural Networks with Homomorphic Encryption and Verifiable Computing." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61638-0_17.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Introduction." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_1.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Preliminaries." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_2.
Der volle Inhalt der QuelleDemirel, Denise, Lucas Schabhüser, and Johannes Buchmann. "Homomorphic Authenticators." In Privately and Publicly Verifiable Computing Techniques. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53798-6_5.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Verifiable computing"
Pei, Xintao, Yuling Chen, Yun Luo, Zaidong Li, and Jianqi Wei. "Lightweight IoT-Oriented Verifiable Computing Scheme in Cloud Computing Circumstance." In 2024 IEEE Cyber Science and Technology Congress (CyberSciTech). IEEE, 2024. https://doi.org/10.1109/cyberscitech64112.2024.00017.
Der volle Inhalt der QuelleMazzocca, Carlo, Stefano Allevi, and Rebecca Montanari. "Certifying IoT Data with Verifiable Credentials." In 2024 22nd International Symposium on Network Computing and Applications (NCA). IEEE, 2024. https://doi.org/10.1109/nca61908.2024.00022.
Der volle Inhalt der QuelleXu, Ye, and Takashi Nishide. "Verifiable Homomorphic Secret Sharing for SIMD Operations." In 2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW). IEEE, 2024. https://doi.org/10.1109/candarw64572.2024.00058.
Der volle Inhalt der QuelleXiong, Keqi, Zehua Liu, Jiayong Wei, and Huimin Gong. "A Blockchain-Based Verifiable Data Quality Assessment Scheme." In 2025 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2025. https://doi.org/10.1109/iwcmc65282.2025.11059446.
Der volle Inhalt der QuelleTabaeiaghdaei, Seyedali, Filippo Costa, Jonghoon Kwon, Patrick Bamert, Yih-Chun Hu, and Adrian Perrig. "Debuglet: Programmable and Verifiable Inter-Domain Network Telemetry." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00032.
Der volle Inhalt der QuelleCastellano, Dario, Roberto De Prisco, and Pompeo Faruolo. "Login System for OpenID Connect with Verifiable Credentials." In 2024 22nd International Symposium on Network Computing and Applications (NCA). IEEE, 2024. https://doi.org/10.1109/nca61908.2024.00027.
Der volle Inhalt der QuelleWang, Yalan, Liqun Chen, Long Meng, and Christopher J. P. Newton. "VCaDID: Verifiable Credentials with Anonymous Decentralized Identities." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00086.
Der volle Inhalt der QuelleZhang, Chi, Peng Jiang, Zijian Zhang, and Liehuang Zhu. "Verifiable Predicate-based Access Control Encryption with Dynamic Revocation." In 2025 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2025. https://doi.org/10.1109/iwcmc65282.2025.11059613.
Der volle Inhalt der QuelleLiu, Shaojie, Hongbo Zhao, and Han Liu. "Demo: Specy Network - Trusted Multichain Automation with Verifiable Specifications." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00134.
Der volle Inhalt der QuelleShaik, Matheen Basha, and Roopa Vishwanathan. "Verifiable Computation in Smart Grids Using Dynamic Slicing." In 2025 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops). IEEE, 2025. https://doi.org/10.1109/percomworkshops65533.2025.00101.
Der volle Inhalt der Quelle