[1] Martinez Gregorio, Zeadally Sherali, Chao Han-Chieh. Editorial: Cloud computing service and architecture models[J]. Information Sciences, 2014,258:353-354.
[2] Lloret Jaime, Garcia Miguel, Tomas Jesus, et al. Architecture and protocol for intercloud communication[J]. Information Sciences, 2014,258:434-451.
[3] Armbrust Michael, Fox Armando, Griffith Rean, et al. A view of cloud computing[J]. Communications of the ACM, 2010,53(4):50-58.
[4] Vera-del Campo Juan, Pegueroles Josep, Hernández-Serrano Juan, et al. DocCloud: A document recommender system on cloud computing with plausible deniability[J]. Information Sciences, 2014,258:387-402.
[5] Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations[C]// Proceedings of the 2nd Theory of Cryptography Conference. 2005:264-282.
[6] Atallah M J, Pantazopoulos K N, Rice J R, et al. Secure outsourcing of scientific computations[J]. Advances in Computers, 2002,54:215-272.
[7] Atallah M J, Li Jiangtao. Secure outsourcing of sequence comparisons[J]. International Journal of Information Security, 2005,4(4):277-287.
[8] Benjamin D, Atallah M J. Private and cheating-free outsourcing of algebraic computations[C]// Proceedings of the 6th Annual Conference on Privacy, Security and Trust (PST’08). 2008:240-245.
[9] Paillier P. Public-key cryptosystems based on composite degree residuosity classes[C]// Proceedings of the EUROCRYPT’99. 1999:223-238.
[10] Even S, Goldreich O, Lempel A. A randomized protocol for signing contracts[J]. Communications of the ACM, 1985,28(6):637-647.
[11] Atallah M J, Frikken K B. Securely outsourcing linear algebra computations[C]// Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. 2010:48-59.
[12] Shamir A. How to share a secret[J]. Communications of the ACM, 1979,22(11):612-613.
[13] Mohassel Payman. Efficient and Secure Delegation of Linear Algebra[DB/OL]. http://eprint.iacr.org/2011/605.pdf, 2012-08-18.
[14] 任晓霞,黄宏宇. 安全高效的大矩阵行列式计算云外包协议[J]. 计算机工程与应用, 2014,50(10):82-86.
[15] Lei Xinyu, Liao Xiaofeng, Huang Tingwen, et al. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud[J]. Information Sciences, 2014,280:205-217.
[16] 胡杏,裴定一,唐春明,等. 可验证安全外包矩阵计算及其应用[J]. 中国科学:信息科学, 2013,43(7):842-852. |