相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Distributed Secure Outsourcing Scheme for Solving Linear Algebraic Equations in Ad Hoc Clouds
Wenlong Shen et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2019)
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing
Kai Zhou et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
Shengshan Hu et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING (2016)
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys
Ximeng Liu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
Jia Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases
Lichun Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
LinSOS: Secure Outsourcing of Linear Computations Based on Affine Mapping
Kai Zhou et al.
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) (2016)
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
Xiaofeng Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
New Algorithms for Secure Outsourcing of Modular Exponentiations
Xiaofeng Chen et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming
Haixin Nie et al.
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2014)
New methods of secure outsourcing of scientific computations
Yerzhan N. Seitkulov
JOURNAL OF SUPERCOMPUTING (2013)
Harnessing the Cloud for Securely Solving Large-scale Systems of Linear Equations
Cong Wang et al.
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011) (2011)
Decoding by linear programming
EJ Candes et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2005)