Amanote Research

Amanote Research

    RegisterSign In

Incentivized Outsourced Computation Resistant to Malicious Contractors

IEEE Transactions on Dependable and Secure Computing - United States
doi 10.1109/tdsc.2015.2499738
Full Text
Open PDF
Abstract

Available in full text

Categories
Electronic EngineeringElectricalComputer Science
Date

November 1, 2017

Authors
Alptekin Kupcu
Publisher

Institute of Electrical and Electronics Engineers (IEEE)


Related search

Distributed Access Control With Outsourced Computation in Fog Computing

2019English

Efficient Secure Two-Party Computation Against Malicious Adversaries

English

Learning to Detect Malicious URLs

ACM Transactions on Intelligent Systems and Technology
Artificial IntelligenceTheoretical Computer Science
2011English

Are Blockchains Immune to All Malicious Attacks?

Financial Innovation
Management of TechnologyFinanceInnovation
2016English

The Propensity to Panic Attacks Among Leaders and Contractors

Uchenye Zapiski RGSU
2019English

Methods to Hide Malicious Codes in PowerPoint

International Journal of e-Education, e-Business, e-Management and e-Learning
2013English

Unfolding the Characteristics of Incentivized Online Reviews

Journal of Retailing and Consumer Services
Marketing
2019English

Secure Outsourced Calculations With Homomorphic Encryption

Advanced Computing: An International Journal
2018English

The General Accounting Office's Access to Government Contractors' Records

University of Chicago Law Review
Law
1982English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy