共 50 条
- [31] An Enhance Mechanism for Secure Data Sharing with Identity Management in Cloud Computing ADVANCES IN COMPUTING AND INTELLIGENT SYSTEMS, ICACM 2019, 2020, : 575 - 582
- [32] Secure Desktop Computing in the Cloud 2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 107 - 112
- [33] ELECTRONIC OUTSOURCING SECURETY BASED ON CLOUD COMPUTING 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING ( ICACTE 2011), 2011, : 99 - 102
- [35] Outsourcing computation of modular exponentiations in cloud computing Cluster Computing, 2013, 16 : 787 - 796
- [36] Outsourcing computation of modular exponentiations in cloud computing CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 787 - 796
- [37] From outsourcing to Cloud computing: evolution of IT services MANAGEMENT RESEARCH REVIEW, 2012, 35 (08): : 664 - 675
- [38] Secure and EfficientRegression Analysis Outsourcing Algorithm for Cloud Server INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
- [39] Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 576 - 583
- [40] Practical Scheme for Secure Outsourcing of Coppersmith's Algorithm KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2019, PT II, 2019, 11776 : 229 - 240