Low Price Guarantee
We Take School POs
Introduction to Secure Outsourcing Computation
Contributor(s): Chen, Xiaofeng (Author)

View larger image

ISBN: 1627057919     ISBN-13: 9781627057912
Publisher: Morgan & Claypool
OUR PRICE: $38.00  

Binding Type: Paperback - See All Available Formats & Editions
Published: February 2016
* Out of Print *

Click for more in this series: Synthesis Lectures on Information Security, Privacy, and Tru
Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Security - Online Safety & Privacy
Series: Synthesis Lectures on Information Security, Privacy, and Tru
Physical Information: 0.19" H x 7.5" W x 9.25" L (0.39 lbs) 93 pages
Features: Bibliography
 
Descriptions, Reviews, Etc.
Publisher Description:
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.

Contributor Bio(s): Chen, Xiaofeng: - Professor Xiaofeng Chen received his B.S. and M.S. on Mathematics from Northwest University, China, in 1998 and 2000, respectively. He got his Ph.D. degree in Cryptography from Xidian University in 2003. Currently, he works at Xidian University as a professor. His research interests include applied cryptography and cloud computing security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 3,000 times at Google Scholar. He is on the Editorial Board of Security and Communication Networks (SCN), Telecommunication Systems (TELS), Computing and Informatics (CAI), and International Journal of High Performance Computing and Networking (IJHPCN), etc. He served as general chair of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) and as program co-chair of the 5th International Conference on Provable Security (ProvSec 2011). He has also served as program committee member in over 30 international conferences. Currently, he is a director of Information Security Center, State Key Laboratory of Integrated Service Networks (ISN), Xidian University.
 
Customer ReviewsSubmit your own review
 
To tell a friend about this book, you must Sign In First!