Related references
Note: Only part of the references are listed.Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization
Anmin Fu et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)
Jia Duan et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
On the Security and Privacy Challenges of Virtual Assistants
Tom Bolton et al.
SENSORS (2021)
Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption
Mingyang Song et al.
SECURITY AND COMMUNICATION NETWORKS (2021)
Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption
Haoran Zong et al.
IEEE ACCESS (2021)
TFHE: Fast Fully Homomorphic Encryption Over the Torus
Ilaria Chillotti et al.
JOURNAL OF CRYPTOLOGY (2020)
Blockchain-based system for secure outsourcing of bilinear pairings
Chao Lin et al.
INFORMATION SCIENCES (2020)
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields
Qiang Zhou et al.
INFORMATION SCIENCES (2020)
A lightweight portable intrusion detection communication system for auditing applications
Carl Nykvist et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)
Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud
Qianqian Su et al.
COMPUTER JOURNAL (2020)
A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication
Malay Kumar et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2020)
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues
A. S. M. Kayes et al.
SENSORS (2020)
Secure outsourcing of large matrix determinant computation
Jiayang Liu et al.
FRONTIERS OF COMPUTER SCIENCE (2020)
Privacy-preserving approximate GWAS computation based on homomorphic encryption
Duhyeong Kim et al.
BMC MEDICAL GENOMICS (2020)
Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud
Yu Wu et al.
IEEE ACCESS (2020)
Key-policy attribute-based encryption against continual auxiliary input leakage
Jiguo Li et al.
INFORMATION SCIENCES (2019)
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
Shengxia Zhang et al.
IEEE ACCESS (2019)
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes
Tongchen Shen et al.
IEEE ACCESS (2019)
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server
Anmin Fu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Lightweight scheme of secure outsourcing SVD of a large matrix on cloud
Chakan Pramkaew et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)
New algorithms for verifiable outsourcing of bilinear pairings
Yanli Ren et al.
SCIENCE CHINA-INFORMATION SCIENCES (2016)
Cloud Computing Service: The Case of Large Matrix Determinant Computation
Xinyu Lei et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)