Author:
Li Jin,Zhang Yinghui,Chen Xiaofeng,Xiang Yang
Funder
National Key Research and Development Program of China
National Natural Science Foundation of China
Distinguished Young Scholars Fund of Department of Education, Guangdong Province
Natural Science Basic Research Plan in Shaanxi Province
Ministry of Education of China
Xi'an University of Posts and Telecommunications
Subject
Law,General Computer Science
Reference55 articles.
1. A view of cloud computing;Armbrust;Commun ACM,2010
2. Securely outsourcing linear algebra computations;Atallah,2010
3. Secure outsourcing of sequence comparisons;Atallah;Int J Inf Secur,2005
4. Secure outsourcing of scientific computations;Atallah,2002
5. On the key exposure problem in chameleon hashes;Ateniese,2005
Cited by
389 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献