![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
5th SCC@AsiaCCS 2017: Abu Dhabi, United Arab Emirates
- Cong Wang, Murat Kantarcioglu:
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017. ACM 2017, ISBN 978-1-4503-4970-3
Keynote Address
- Danfeng (Daphne) Yao:
Cloud Data Analytics for Security: Applications, Challenges, and Opportunities. 1
Paper Session 1
- Balazs Pejo, Qiang Tang
:
To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation Verification. 3-10 - Ghassan Karame, Matthias Neugschwandtner, Melek Önen
, Hubert Ritzdorf:
Reconciling Security and Functional Requirements in Multi-tenant Clouds. 11-18 - Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid:
Cloud Storage File Recoverability. 19-26 - Shaojing Fu, Yunpeng Yu, Ming Xu:
A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud. 27-33
Paper Session 2
- Yoshinori Aono, Takuya Hayashi
, Le Trieu Phong, Lihua Wang:
Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption. 35-42 - Lukasz Krzywiecki
, Miroslaw Kutylowski:
Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup. 43-50 - Zhenkui Shi, Xiaoning Liu
, Xingliang Yuan
:
Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination. 51-57 - Qiang Tang
, Husen Wang:
Privacy-preserving Hybrid Recommender System. 59-66
Paper Session 3
- Maryam Sepehri, Stelvio Cimato
, Ernesto Damiani:
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud. 67-74 - Jun Zhang, Xin Wang, Siu-Ming Yiu, Zoe Lin Jiang, Jin Li:
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM. 75-82 - Pengchuan Su, Nan Sun, Liehuang Zhu, Yandong Li, RongRong Bi, Meng Li
, Zijian Zhang:
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System. 83-90
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.