Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation

Shanshan Kong, Yongquan Cai, Fei Xue, Haiyang Yu, Allah Ditta. Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation. IJWMC, 14(1):90-96, 2018. [doi]

Abstract

Abstract is missing.