会议专题

Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud

Background Related Works Our Works Background The proliferation of mobile devices,such as smart phones and netbooks,computationally weak devices which might off-load heavy computations to a cloud service provider.

Dawei Xie Haining Yang Jing Qin Jixin Ma

School of Mathematics,Shandong University

国内会议

第一届网络空间安全科学国际会议(The 1st International Conference on Science of Cyber Security-SciSec 2018)

北京

英文

1-25

2018-08-12(万方平台首次上网日期,不代表论文的发表时间)