Author:
Ding Yong,Xu Zheng,Ye Jun,Choo Kim-Kwang Raymond
Funder
Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing
Lab of Security Insurance of Cyberspace
Sichuan province key laboratory of colleges and universities
Science Founding of Artificial Intelligence Key Laboratory of Sichuan Province
Sichuan University of Science and Engineering
National Natural Science Foundation of China
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Theoretical Computer Science
Reference34 articles.
1. Securely outsourcing linear algebra computations;Atallah,2010
2. Secure outsourcing of scientific computations;Atallah;Adv. Comput.,2002
3. Hiding instances in multioracle queries;Beaver,1990
4. Locally random reductions: improvements and applications;Beaver;J. Cryptol.,1997
5. Private and cheating-free outsourcing of algebraic computations;Benjamin,2008
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献