Author:
Chen Fei,Xiang Tao,Yang Yuanyuan
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference39 articles.
1. Secure outsourcing of scientific computations;Atallah;Adv. Comput.,2002
2. S. Benabbas, R. Gennaro, Y. Vahlis, Verifiable delegation of computation over large datasets, in: Advances in Cryptology–CRYPTO 2011, 2011, pp. 111–131.
3. How to generate cryptographically strong sequences of pseudo-random bits;Blum;SIAM J. Comput.,1984
4. Convex Optimization;Boyd,2004
5. F. Chen, Secure LP and LE outsourcing Source Code, 2013. https://sites.google.com/site/chenfeiorange/secure-le-and-lp-outsourcing.
Cited by
57 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献