共 13 条
[1]
Subashini S(2011)A survey on security issues in service delivery models of cloud computing J Netw Comput Appl 34 1-11
[2]
Kavitha V(2014)New algorithms for secure outsourcing of modular exponentiations IEEE Trans Paral Distr Syst 25 2386-2396
[3]
Chen X F(2015)Identity-based encryption with outsourced revocation in cloud computing IEEE Trans Comput 64 425-437
[4]
Li J(2015)Efficient algorithms for secure outsourcing of bilinear pairings Theor Comput Sci 562 112-121
[5]
Ma J F(2016)New algorithms for verifiable outsourcing of bilinear pairings Sci China Inf Sci 59 099103-undefined
[6]
Li J(undefined)undefined undefined undefined undefined-undefined
[7]
Li J W(undefined)undefined undefined undefined undefined-undefined
[8]
Chen X F(undefined)undefined undefined undefined undefined-undefined
[9]
Chen X F(undefined)undefined undefined undefined undefined-undefined
[10]
SusiloW L J(undefined)undefined undefined undefined undefined-undefined