000 | 03075nam a22004815i 4500 | ||
---|---|---|---|
001 | 978-3-031-02348-4 | ||
003 | DE-He213 | ||
005 | 20240730163910.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2016 sz | s |||| 0|eng d | ||
020 |
_a9783031023484 _9978-3-031-02348-4 |
||
024 | 7 |
_a10.1007/978-3-031-02348-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aChen, Xiaofeng. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981105 |
|
245 | 1 | 0 |
_aIntroduction to Secure Outsourcing Computation _h[electronic resource] / _cby Xiaofeng Chen. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXIII, 79 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aPreface -- Acknowledgments -- Introduction -- Preliminaries -- Secure Outsourcing of Scientific Computations -- Secure Outsourcing of Cryptographic Operations -- Secure Outsourcing of Large Database With Updates -- Conclusion and Future Works -- Bibliography -- Author's Biography. | |
520 | _aWith the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
710 | 2 |
_aSpringerLink (Online service) _981106 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012204 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034763 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _981107 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02348-4 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85106 _d85106 |