111 results found (page 5 of 8)
http://www.cs.ucla.edu/~rafail

…neerng and Medicine, March 17, 2020 Invited talk: Distinguished Lecture Series, Cloud Security , Texas A&M University, Computer Science Department, October, 2018. Invited Keynote Lecture: workshop on "Mathematics of Information-Theoretic Cryptography" Institute of Mathematical Sc…

http://people.cs.georgetown.edu/jthaler

…t reading the edge stream of a massive graph may delegate some of its work to a cloud service. We seek algorithms that allow the client to verify a purported proof sent by the cloud service that the work done in the cloud is correct. A line of work starting with Chakrabarti et al…