Sökning: "verifiable computation"
Visar resultat 1 - 5 av 6 avhandlingar innehållade orden verifiable computation.
1. Cryptographic Tools for Privacy Preservation and Verifiable Randomness
Sammanfattning : Our society revolves around communication. The Internet is the biggest, cheapest and fastest digital communication channel used nowadays. Due to the continuous increase of daily communication among people worldwide, more and more data might be stolen, misused or tampered. LÄS MER
2. Outsourcing Computations to a Cloud That You Don't Trust
Sammanfattning : In many application scenarios, data need to be collected, stored and processed. Often sensitive data are collected from IoT devices, which are constrained regarding their resources, and, thus, remote, untrusted cloud servers are required to perform the computations. LÄS MER
3. Cryptographic Tools for Privacy Preservation
Sammanfattning : Data permeates every aspect of our daily life and it is the backbone of our digitalized society. Smartphones, smartwatches and many more smart devices measure, collect, modify and share data in what is known as the Internet of Things. LÄS MER
4. Be More and be Merry: Enhancing Data and User Authentication in Collaborative Settings
Sammanfattning : Cryptography is the science and art of keeping information secret to un-intended parties. But, how can we determine who is an intended party and who is not? Authentication is the branch of cryptography that aims at confirming the source of data or at proving the identity of a person. This Ph.D. LÄS MER
5. Secure and Privacy-Preserving Cloud-Assisted Computing
Sammanfattning : Smart devices such as smartphones, wearables, and smart appliances collect significant amounts of data and transmit them over the network forming the Internet of Things (IoT). Many applications in our daily lives (e.g., health, smart grid, traffic monitoring) involve IoT devices that often have low computational capabilities. LÄS MER