The following publications are possibly variants of this publication:
- Improved algorithm for secure outsourcing of modular exponentiations with high checkabilityJun Ye, Xiaofeng Chen 0001, Jianfeng Ma. ijahuc, 23(3/4):182-191, 2016. [doi]
- New Algorithms for Secure Outsourcing of Modular ExponentiationsXiaofeng Chen 0001, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou. esorics 2012: 541-556 [doi]
- New Algorithms for Secure Outsourcing of Modular ExponentiationsXiaofeng Chen 0001, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou. tpds, 25(9):2386-2396, 2014. [doi]
- Secure Outsourcing of Multiple Modular ExponentiationsJinyang Li, Jun Ye. aina 2015: 808-811 [doi]
- Secure Outsourcing of Modular Exponentiation with Single Untrusted ServerJun Ye, Jianfeng Wang. nbis 2015: 643-645 [doi]
- Secure outsourcing of modular exponentiations in cloud and cluster computingJun Ye, Zheng Xu, Yong Ding. cluster, 19(2):811-820, 2016. [doi]