{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T04:02:41Z","timestamp":1746417761177,"version":"3.40.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319111186"},{"type":"electronic","value":"9783319111193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11119-3_18","type":"book-chapter","created":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T20:40:33Z","timestamp":1408048833000},"page":"188-199","source":"Crossref","is-referenced-by-count":5,"title":["Cloud-Oriented SAT Solver Based on Obfuscating CNF Formula"],"prefix":"10.1007","author":[{"given":"Ying","family":"Qin","sequence":"first","affiliation":[]},{"given":"Shengyu","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Jingzhu","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Huadong","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Putnam, D.: A Computing Procedure for Quantification Theory. Journal of the ACM 7(3), 201","DOI":"10.1145\/321033.321034"},{"key":"18_CR2","unstructured":"G. Hachtel, F. Somenzi. Logic synthesis and verification algorithms, I-XXIII, 1-564 (2006)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/10722167_15","volume-title":"Computer Aided Verification","author":"E. Clarke","year":"2000","unstructured":"Clarke, E., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-Guided Abstraction Refinement. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, pp. 154\u2013169. Springer, Heidelberg (2000)"},{"key":"18_CR4","unstructured":"Tseitin, G.: On the complexity of derivation in propositional calculus. Studies in Constr. Math. and Math. Logic. (1968)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in Cloud computing. In: INFOCOM 2011, pp. 820-828 (2011)","DOI":"10.1109\/INFCOM.2011.5935305"},{"key":"18_CR6","unstructured":"Li, C.: Integrating equivalency reasoning into Davis-Putnam procedure. In: AAAI 2000, pp. 291-296 (2000)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Ostrowski, R.: Recovering and exploiting structural knowledge from cnf formulas, CP 2002, pp. 185-199 (2002)","DOI":"10.1007\/3-540-46135-3_13"},{"key":"18_CR8","unstructured":"Roy, J., Markov, I., Bertacco, V.: Restoring Circuit Structure from SAT Instances. In: IWLS 2004, pp. 361\u2013368 (2004)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Fu, Z., Malik, S.: Extracting Logic Circuit Structure from Conjunctive Normal Form Descriptions. In: VLSI Design 2007, pp. 37\u201342 (2007)","DOI":"10.1109\/VLSID.2007.81"},{"key":"18_CR10","unstructured":"MiniSat \u2014 SAT Algorithms and Applications Invited talk given by Niklas S\u00f6rensson at the CADE-20 workshop ESCAR, http:\/\/minisat.se\/Papers.html"},{"key":"18_CR11","unstructured":"You, H.: Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In: CCS 2009 (2009)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Rothblum, G.: Black-Box Obfuscation for d-CNFs. In: ITCS 2014, pp. 235\u2013250 (2014)","DOI":"10.1145\/2554797.2554820"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"R. Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 465\u2013482. Springer, Heidelberg (2010)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Du, W., Goodrich, M.: Searching for High-Value Rare Events with Uncheatable Grid Computing (2004)","DOI":"10.1109\/ICDCS.2004.1281562"},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0065-2458(01)80019-X","volume":"54","author":"M. Atallah","year":"2001","unstructured":"Atallah, M., Pantazopoulos, K., Rice, J., Spafford, E.: Secure outsourcing of scientific computations. Advances in Computers\u00a054, 215\u2013272 (2001)","journal-title":"Advances in Computers"},{"issue":"4","key":"18_CR16","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10207-005-0070-3","volume":"4","author":"M. Atallah","year":"2005","unstructured":"Atallah, M., Li, J.: Secure outsourcing of sequence comparisons. Int. J. Inf. Sec.\u00a04(4), 277\u2013287 (2005)","journal-title":"Int. J. Inf. Sec."},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/3-540-45353-9_31","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"P. Golle","year":"2001","unstructured":"Golle, P., Mironov, I.: Uncheatable distributed computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 425\u2013440. Springer, Heidelberg (2001)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Szajda, D., Lawson, B.G., Owen, J.: Hardening functions for large scale distributed computations. In: ISSP 2003, pp. 216\u2013224 (2003)","DOI":"10.1109\/SECPRI.2003.1199338"},{"key":"18_CR19","unstructured":"Paralleling OpenSMT Towards Cloud Computing, http:\/\/www.inf.usi.ch\/urop-Tsitovich-2-127208.pdf?"},{"key":"18_CR20","unstructured":"Formal in the Cloud OneSpins New Spin on Cloud Computing, http:\/\/www.eejournal.com\/archives\/articles\/20130627-onespin\/?printView=true"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11119-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T06:07:39Z","timestamp":1746338859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11119-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319111186","9783319111193"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11119-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}