Cryptographic security for mobile code, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.2-11, 2001. ,
DOI : 10.1109/SECPRI.2001.924283
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.824
Elastic Block Store (EBS) http://aws.amazon.com/ebs, 2011. ,
Elastic Compute Cloud (EC2) http://aws.amazon.com/ec2, 2011. ,
Secure outsourcing of scientific computations, Advances in Computers, vol.54, pp.216-272, 2001. ,
DOI : 10.1016/S0065-2458(01)80019-X
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.9763
The EAX Mode of Operation, FSE'04, pp.389-407, 2004. ,
DOI : 10.1007/978-3-540-25937-4_25
Evaluating 2-DNF Formulas on Ciphertexts, TCC'05, pp.325-341, 2005. ,
DOI : 10.1007/978-3-540-30576-7_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.6692
Twin Clouds: An architecture for secure cloud computing (Extended Abstract) Workshop on Cryptography and Security in Clouds, 2011. ,
Improved Delegation of Computation Using Fully Homomorphic Encryption, CRYPTO'10, pp.483-501, 2010. ,
DOI : 10.1007/978-3-642-14623-7_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.303.1430
Top threats to cloud computing, 2010. ,
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers, CRYPTO'10, pp.465-482, 2010. ,
DOI : 10.1007/978-3-642-14623-7_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.1571
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592
Implementing Gentry???s Fully-Homomorphic Encryption Scheme, EUROCRYPT'11, 2011. ,
DOI : 10.1007/978-3-642-20465-4_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6183
One-Time Programs, CRYPTO'08, pp.39-56, 2008. ,
DOI : 10.1007/978-3-540-85174-5_3
Secure Computation on the Web: Computing without Simultaneous Interaction, Cryptology ePrint Archive, vol.157, 2011. ,
DOI : 10.1007/978-3-642-22792-9_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.7744
TASTY, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.451-462, 2010. ,
DOI : 10.1145/1866307.1866358
Secure guaranteed computation, Cryptology ePrint Archive Report, vol.449, 2010. ,
How to Securely Outsource Cryptographic Computations, TCC'05, pp.264-282, 2005. ,
DOI : 10.1007/978-3-540-30576-7_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.2617
Hardware-Assisted Secure Computation, 2009. ,
DOI : 10.1349/ddlp.298
Small, stupid, and scalable, Proceedings of the fifth ACM workshop on Scalable trusted computing, STC '10, pp.41-52, 2010. ,
DOI : 10.1145/1867635.1867643
Embedded SFE: Offloading Server and Network Using Hardware Tokens, FC'10, pp.207-221, 2010. ,
DOI : 10.1007/978-3-642-14577-3_17
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs, CHES'10, pp.383-397, 2010. ,
DOI : 10.1007/978-3-642-15031-9_26
Cryptographic Cloud Storage, Real-Life Cryptographic Protocols and Standardization, pp.136-149, 2010. ,
DOI : 10.1007/978-3-642-14992-4_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.4794
Improved Garbled Circuit: Free XOR Gates and Applications, ICALP'08, pp.486-498, 2008. ,
DOI : 10.1007/978-3-540-70583-3_40
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.5268
Secure Outsourced Computation, AFRICACRYPT'11, 2011. ,
DOI : 10.1007/978-3-642-13013-7_25
Fairplay ? a secure two-party computation system, Security, pp.287-302, 2004. ,
Privacy preserving auctions and mechanism design, Proceedings of the 1st ACM conference on Electronic commerce , EC '99, pp.129-139, 1999. ,
DOI : 10.1145/336992.337028
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.7459
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT'99, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4035
Practical Secure Evaluation of Semi-private Functions, ACNS'09, pp.89-106, 2009. ,
DOI : 10.1007/978-3-540-85855-3_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.2759
Secure Two-Party Computation Is Practical, ASIACRYPT'09, pp.250-267, 2009. ,
DOI : 10.1007/978-3-642-10366-7_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.2341
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009. ,
DOI : 10.1145/1653662.1653687
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588
Token-Based Cloud Computing, TRUST'10 Workshop on Trust in the Cloud, pp.417-429, 2010. ,
DOI : 10.1007/978-3-642-13869-0_30
Design and implementation of a TCG-based integrity measurement architecture, 2004. ,
Towards trusted cloud computing, Hot Topics in Cloud Computing (HotCloud'09, 2009. ,
Seeding clouds with trust anchors, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10, pp.43-46, 2010. ,
DOI : 10.1145/1866835.1866843
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.1993
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes, PKC'10, pp.420-443, 2010. ,
DOI : 10.1007/978-3-642-13013-7_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.3315
CryptoDSPs for Cloud Privacy, Workshop on Cloud Information System Engineering (CISE'10), 2010. ,
DOI : 10.1109/TIFS.2011.2109385
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.429
Fully Homomorphic Encryption over the Integers, EUROCRYPT'10, pp.24-43, 2010. ,
DOI : 10.1007/978-3-642-13190-5_2
On the impossibility of cryptography alone for privacypreserving cloud computing, HotSec'10, pp.1-8, 2010. ,
How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986. ,
DOI : 10.1109/SFCS.1986.25