Introduction to Secure Outsourcing Computation (Record no. 85106)

000 -LEADER
fixed length control field 03075nam a22004815i 4500
001 - CONTROL NUMBER
control field 978-3-031-02348-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730163910.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220601s2016 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031023484
-- 978-3-031-02348-4
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Chen, Xiaofeng.
245 10 - TITLE STATEMENT
Title Introduction to Secure Outsourcing Computation
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2016.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIII, 79 p.
490 1# - SERIES STATEMENT
Series statement Synthesis Lectures on Information Security, Privacy, and Trust,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Preface -- Acknowledgments -- Introduction -- Preliminaries -- Secure Outsourcing of Scientific Computations -- Secure Outsourcing of Cryptographic Operations -- Secure Outsourcing of Large Database With Updates -- Conclusion and Future Works -- Bibliography -- Author's Biography.
520 ## - SUMMARY, ETC.
Summary, etc With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-02348-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1945-9750
912 ## -
-- ZDB-2-SXSC

No items available.