Introduction
Preliminaries
Proof Based Verifiable Computing
Verifiable Computing from Fully Homomorphic Encryption
Homomorphic Authenticators
Verifiable Computing Frameworks from Functional Encryption and Functional Signatures
Verifiable Computing for Specific Applications
Analysis of the State of the Art
Conclusion