Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation

Shanshan Kong, Yongquan Cai, Fei Xue, Haiyang Yu, Allah Ditta. Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation. IJWMC, 14(1):90-96, 2018. [doi]

No reviews for this publication, yet.