Author:
Ben Aissa Anis,Taloba Ahmed I.,Abd-Aziz Rasha M.,Abdalla Mohamed Islam,Hussein Loay F.
Reference20 articles.
1. A view of cloud computing;Armbrust;Commun. ACM,2010
2. M.J. Atallah, K.B. Frikken. Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM symposium on information, computer and communications security, ASIACCS ’10. NewYork, NY, USA: ACM; 2010. p. 48–59.
3. Secure outsourcing of sequence comparisons;Atallah;Int. J. Inf. Secur.,2005
4. M.J. Atallah, K. Pantazopoulos, J.R. Rice, E.E. Spafford. Secure outsourcing of scientific computations. In: Zelkowitz MV, editor. Trends in software engineering, vol. 54. of Advances in Computers. Elsevier; 2002. p. 215–72.
5. On the Key Exposure Problem in Chameleon Hashes;Ateniese,2005
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献