共 50 条
- [21] Efficient secure and verifiable KNN set similarity search over outsourced clouds [J]. HIGH-CONFIDENCE COMPUTING, 2023, 3 (01):
- [24] Secure Data Storage Operations with Verifiable Outsourced Decryption for Mobile Cloud Computing [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
- [25] Towards an efficient and secure computation over outsourced encrypted data using distributed hash table [J]. International Journal of Cloud Computing, 2022, 11 (03): : 217 - 233
- [28] Secure Computation on Outsourced Data: A 10-year Retrospective [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2014, PT I, 2014, 8421 : 16 - 27
- [29] Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption [J]. Soft Computing, 2018, 22 : 707 - 714
- [30] MD-vcMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 349 - 362