Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference28 articles.
1. Atallah MJ, Frikken KB (2010) Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM symposium on information, Computer and Communications Security. ACM, pp. 48–59
2. Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Privacy, Security and Trust, 2008. PST'08. Sixth Annual Conference on. IEEE, p 240–245
3. Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference. Springer, Berlin Heidelberg, pp 213–229
4. Chaum D, Pedersen TP (1992) Wallet databases with observers. In: Annual international cryptology conference. Springer, Berlin Heidelberg, pp 89–105
5. Chen X, Li J, Huang X, Li J, Xiang Y, Wong DS (2014a) Secure outsourced attribute-based signatures. IEEE Trans Parallel Distrib Syst 25(12):3285–3294
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献