Llwytho...
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the cloud was proposed.Firstly,the outsourcing computi...
Wedi'i Gadw mewn:
Prif Awduron: | , |
---|---|
Fformat: | Artigo |
Iaith: | Inglês |
Cyhoeddwyd: |
POSTS&TELECOM PRESS Co., LTD
2016-11-01
|
Cyfres: | 网络与信息安全学报 |
Pynciau: | |
Mynediad Ar-lein: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00109 |
Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|