注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
PARTE : automatic program partitioning for efficient computation over encrypted data
作者: Meelap Shah
DOI:
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
1
下载资源
0
mit.edu
本地加速
暂无可下载资源,当前可以选择系统获取到有开放资源时
通知我
或者直接发起求助
文献求助
参考文章
(18)
1.
Edward W. Felten, Michael J. Freedman, Ariel J. Feldman, William P. Zeller,
SPORC: group collaboration using untrusted cloud resources
operating systems design and implementation.
pp. 337- 350 ,(2010) ,
10.5555/1924943.1924967
2.
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill,
Order-Preserving Symmetric Encryption
international cryptology conference.
pp. 224- 241 ,(2009) ,
10.1007/978-3-642-01001-9_13
3.
Jean Yang, Kuat Yessenov, Armando Solar-Lezama,
A language for automatically enforcing privacy policies
symposium on principles of programming languages.
,vol. 47, pp. 85- 96 ,(2012) ,
10.1145/2103621.2103669
4.
Craig Gentry,
Fully homomorphic encryption using ideal lattices
Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09.
pp. 169- 178 ,(2009) ,
10.1145/1536414.1536440
5.
Adam Chlipala,
Ur
Proceedings of the 2010 ACM SIGPLAN conference on Programming language design and implementation - PLDI '10.
,vol. 45, pp. 122- 133 ,(2010) ,
10.1145/1806596.1806612
6.
P. Wadler, S. Blott,
How to make ad-hoc polymorphism less ad hoc
symposium on principles of programming languages.
pp. 60- 76 ,(1989) ,
10.1145/75277.75283
7.
Alvin Cheung, Samuel Madden, Owen Arden, Andrew C. Myers,
Automatic partitioning of database applications
Proceedings of the VLDB Endowment.
,vol. 5, pp. 1471- 1482 ,(2012) ,
10.14778/2350229.2350262
8.
Edward W. Felten, Aaron Blankstein, Michael J. Freedman, Ariel J. Feldman,
Social networking with frientegrity: privacy and integrity with an untrusted provider
usenix security symposium.
pp. 31- 31 ,(2012)
9.
Pascal Paillier,
Public-key cryptosystems based on composite degree residuosity classes
theory and application of cryptographic techniques.
pp. 223- 238 ,(1999) ,
10.1007/3-540-48910-X_16
10.
Dawn Xiaoding Song, D. Wagner, A. Perrig,
Practical techniques for searches on encrypted data
ieee symposium on security and privacy.
pp. 44- 55 ,(2000) ,
10.1109/SECPRI.2000.848445
来源期刊
Massachusetts Institute of Technology
2013 年,
Volume: , Issue: ,
Page:
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...