Introduction to Secure Outsourcing Computation

· Springer Nature
電子書
79
頁數
評分和評論未經驗證 瞭解詳情

關於這本電子書

With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.

關於作者

Professor Xiaofeng Chen received his B.S. and M.S. on Mathematics from Northwest University, China, in 1998 and 2000, respectively. He got his Ph.D. degree in Cryptography from Xidian University in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 3,000 times at Google Scholar. He is on the Editorial Board of Security and Communication Networks (SCN), Telecommunication Systems (TELS), Computing and Informatics (CAI), and International Journal of High Performance Computing and Networking (IJHPCN), etc. He served as general chair of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) and as program co-chair of the 5th International Conference on Provable Security (ProvSec 2011). He has also served as program committee member in over 30 international conferences. Currently, he is a director of Information Security Center, State Key Laboratory of Integrated Service Networks (ISN), Xidian University.

為這本電子書評分

請分享你的寶貴意見。

閱讀資訊

智能手機和平板電腦
請安裝 Android 版iPad/iPhone 版「Google Play 圖書」應用程式。這個應用程式會自動與你的帳戶保持同步,讓你隨時隨地上網或離線閱讀。
手提電腦和電腦
你可以使用電腦的網絡瀏覽器聆聽在 Google Play 上購買的有聲書。
電子書閱讀器及其他裝置
如要在 Kobo 等電子墨水裝置上閱覽書籍,你需要下載檔案並傳輸到你的裝置。請按照說明中心的詳細指示,將檔案傳輸到支援的電子書閱讀器。