Author:
Aparna Obilineni,Kuncham Padma Priyanka,Christy A.
Reference26 articles.
1. X. Chen, J. Li, J. Ma, Q. Tang, W. Lou, New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)
2. R. Akimana, O. Markowitch, Y. Roggeman, Secure outsourcing of DNA sequences comparisons in a grid environment. WSEAS Trans. Comput. Res. 2(2), 262–269 (2007)
3. M. Blanton, M.J. Atallah, K.B. Frikken, Q. Malluhi, Secure and efficient outsourcing of sequence comparisons, in Proceedings of European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, 2012, pp. 505–522
4. Y. Feng, H. Ma, X. Chen, H. Zhu, Secure and verifiable outsourcing of sequence comparisons, in Proceedings of International Conference Information and Communication Technology-EurAsia, Yogyakarta, Indonesia, 2013, pp. 243–252
5. S. Salinas, X. Chen, J. Li, P. Li, ‘A tutorial on secure outsourcing of large-scale computations for big data.’ IEEE Access 4, 1406–1416 (2016)