Introduction to Secure Outsourcing Computation

Introduction to Secure Outsourcing Computation

Morgan & Claypool | English | 2016 | ISBN-10: 1627057919 | 94 Pages | PDF | 1.13 mb
by Xiaofeng Chen (Author)

The increasingly prevailing adoption of cloud computing enables people to feast on the benefits from it, such as on-demand service, pay-per-use manner, high response speed, and worry-free deployment. Nevertheless, the fast propagation as well as popularization of cloud computing also gives rise to serious security and privacy concerns accompanying with the advantages. In this book, we focus on the security and privacy issues with respect to an important exemplification of cloud computing - outsourcing computation, which is a hot issue in both academic research and industrial applications. More specifically, this book provides a systematic overview on outsourcing computation security, from the foundations to the state-of-the-art schemes, from the (normally not so efficient) general constructions to the highly efficient ad-hoc designs. Our main objective is to make this book beneficial to a variety of potential readers, including both academic researchers and industrial professionals. A diverse body of OC constructions are reviewed, the most prominent schemes are discussed, and several promising future directions are envisioned for the follow-up studies.


[Fast Download] Introduction to Secure Outsourcing Computation

Ebooks related to "Introduction to Secure Outsourcing Computation" :
Primality Testing in Polynomial Time: From Randomized Algorithms to PRIMES Is in P
Trustworthy Policies for Distributed Repositories
Privacy Risk Analysis
Primality Testing in Polynomial Time: From Randomized Algorithms to PRIMES Is in P
Cryptanalytic Attacks on RSA
Optical Coding Theory with Prime
Digital Signatures
Boundary Retracement: Processes and Procedures
Cryptology Unlocked
Cryptographic Hardware and Embedded Systems
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.