X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptography (60) 60
computer science, information systems (58) 58
cloud computing (53) 53
encryption (47) 47
computer science, theory & methods (45) 45
security (43) 43
engineering, electrical & electronic (36) 36
verifiable computation (35) 35
computation (32) 32
computer science, software engineering (31) 31
computer science (29) 29
privacy (29) 29
telecommunications (27) 27
verifiable secret sharing (27) 27
algorithms (26) 26
outsourcing (26) 26
computer science, hardware & architecture (22) 22
servers (22) 22
computer information security (17) 17
mathematical analysis (16) 16
signatures (16) 16
studies (16) 16
analysis (15) 15
computer security (15) 15
construction (15) 15
protocols (15) 15
server (13) 13
verifiable (13) 13
efficient (12) 12
mathematics, applied (12) 12
polynomials (12) 12
scheme (12) 12
secure (12) 12
verschlüsselung (12) 12
verifiable database (11) 11
verifiable encryption (11) 11
communications engineering, networks (10) 10
computer communication networks (10) 10
data encryption (10) 10
data security (10) 10
databases (10) 10
mathematical models (10) 10
proofs (10) 10
research (10) 10
secret sharing (10) 10
access control (9) 9
authentication (9) 9
communication networks (9) 9
data storage (9) 9
indexes (9) 9
program verification (9) 9
messages (8) 8
networks (8) 8
optimization (8) 8
searching (8) 8
voting (8) 8
cloud-computing (7) 7
coding and information theory (7) 7
computer science, general (7) 7
computer simulation (7) 7
cryptographic protocols (7) 7
delegation (7) 7
electronic voting (7) 7
interpolation (7) 7
methods (7) 7
outsourcing computation (7) 7
proving (7) 7
public key (7) 7
software (7) 7
thresholds (7) 7
verifiable search (7) 7
channels (6) 6
computer programs (6) 6
digital signatures (6) 6
e-voting (6) 6
homomorphic verifiable tags (6) 6
mathematics (6) 6
protocol (6) 6
usage (6) 6
vector commitment (6) 6
verifiable computing (6) 6
attribute-based encryption (5) 5
bulging (5) 5
cloud (5) 5
combinatorics (5) 5
complexity (5) 5
computational modeling (5) 5
data bases (5) 5
data integrity (5) 5
electronics (5) 5
fair exchange (5) 5
integrity (5) 5
keyword search (5) 5
management (5) 5
operating systems (5) 5
policies (5) 5
provable data possession (5) 5
public key infrastructure (5) 5
public verifiability (5) 5
publicly verifiable secret sharing (5) 5
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Computers, ISSN 0018-9340, 10/2016, Volume 65, Issue 10, pp. 3184 - 3195
The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it... 
Verifiable database | vector commitment | Databases | incremental cryptography | Outsourcing | Encryption | Electronic mail | Servers | outsourcing computations | Research | Data bases
Journal Article
Information Sciences, ISSN 0020-0255, 02/2019, Volume 475, pp. 18 - 28
The primitive of verifiable database (VDB) enables a resource-limited client to securely outsource a large and dynamic database on an untrusted server.... 
Cloud computing | Verifiable database | Vector commitment | Searchable encryption | SUPPORT | ENCRYPTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTATION | OUTSOURCED DATABASE | Analysis | Databases
Journal Article
Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, 8/2019, Volume 10, Issue 8, pp. 3045 - 3057
Journal Article
Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, ISSN 2325-9000, 2017, pp. 101 - 104
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8712, Issue 1, pp. 148 - 162
Conference Proceeding
IEEE Transactions on Emerging Topics in Computing, ISSN 2168-6750, 11/2017, pp. 1 - 1
Storage is one of the main services that the cloud provides users. Utilizing the cloud to store large amounts of data can alleviate the cost of storage and the... 
Cloud computing | Verifiable database | Databases | public verifiability | polynomial commitment | Hardware | Cryptography | Sun | Investment
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11099, pp. 83 - 100
Conference Proceeding
2016, Synthesis lectures on information security, privacy, & trust, ISBN 1627057919, Volume 16, xiii, 79 pages
Book
2011, Lecture Notes in Computer Science, ISBN 9783642248603, Volume 7001
Book Chapter
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 09/2015, Volume 12, Issue 5, pp. 546 - 556
The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it... 
Cloud computing | Verifiable database | Secure Outsourcing | Vector Commitment | Educational institutions | Vectors | Outsourcing | Servers | Security | Indexes | COMPUTER SCIENCE, SOFTWARE ENGINEERING | vector commitment | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | CLOUD | secure outsourcing | COMPUTER SCIENCE, INFORMATION SYSTEMS | SYSTEMS | cloud computing
Journal Article
Information Sciences, ISSN 0020-0255, 05/2017, Volume 387, pp. 221 - 237
With the advent of cloud computing, outsourcing databases to remote cloud servers provide the elastic, flexible and affordable data management services for the... 
Outsourced database | Public authentication | Homomorphic verifiable tags | COMPUTER SCIENCE, INFORMATION SYSTEMS | QUERY | Information management | Outsourcing
Journal Article
Information Sciences, ISSN 0020-0255, 04/2019, Volume 479, pp. 664 - 678
With the prevalence of cloud computing, the resource constrained clients are trended to outsource their computation-intensive tasks to the cloud server.... 
Batch matrix multiplication | Privacy protection | Public delegation | Publicly verifiable computation | CLOUD | COMPUTER SCIENCE, INFORMATION SYSTEMS | ALGORITHMS | DATABASE | LARGE-SCALE SYSTEMS | DELEGATION | SECURE | SERVICE | EFFICIENT
Journal Article
IEEE Transactions on Knowledge and Data Engineering, ISSN 1041-4347, 8/2019, pp. 1 - 1
In this paper, we consider the SQL Selection-GroupBy-Aggregation (SGA) query evaluation on an untrusted MapReduce system in which mappers and reducers may... 
Verifiable computation | Aggregates | Query processing | Authentication | Transforms | Probabilistic logic | Data structures | Task analysis | Database security | MapReduce
Journal Article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, ISSN 1000-1239, 08/2018, Volume 55, Issue 8, pp. 1800 - 1808
Journal Article
Journal of Computer and System Sciences, ISSN 0022-0000, 06/2017, Volume 86, pp. 49 - 58
The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server and the client... 
Outsourcing of storage | Verifiable database | Public verifiability | Bilinear pairings | Vector commitment | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | SECURE | COMPUTER SCIENCE, THEORY & METHODS | Computer science | Databases
Journal Article
2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 06/2018, pp. 5 - 11
The security of outsourced data has been a key issue in cloud applications. Previous researches have focused on the remote data auditing and verification... 
Cloud computing | Protocols | cloud storage | Generators | Servers | Security | Indexes | remote data verification | verifiable database | Remote data verification | Verifiable database | Cloud storage
Conference Proceeding
Proceedings of the Symposium on applied computing, 04/2017, Volume 128005, pp. 370 - 377
In the verifiable database (VDB) model, a computationally weak client (database owner) delegates his database management to a database service provider on the... 
database auditing | authenticated data structures | outsourced database security | verifiable database | big databases security in the cloud | Verifiable database | Authenticated data structures | Outsourced database security | Big databases security in the cloud | Database auditing
Conference Proceeding
Journal of Network and Computer Applications, ISSN 1084-8045, 09/2018, Volume 118, pp. 102 - 112
Journal Article
Data Science and Engineering, ISSN 2364-1185, 9/2016, Volume 1, Issue 3, pp. 178 - 188
Journal Article
IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 08/2018, Volume 29, Issue 8, pp. 1721 - 1735
Searchable Symmetric Encryption (SSE) has been widely studied in cloud storage, which allows cloud services to directly search over encrypted data. Most SSE... 
Cloud computing | secure data search | Data integrity | verifiable data search | Cloud | Data models | Encryption | Servers | Indexes | ENCRYPTION | CLOCK SYNCHRONIZATION | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Freshness | Data storage | Data search
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.