Login / Signup

Verifiable Computation on Outsourced Encrypted Data.

Junzuo LaiRobert H. DengHweeHwa PangJian Weng
Published in: ESORICS (1) (2014)
Keyphrases
  • third party
  • encrypted data
  • dynamic allocation
  • sensitive data
  • service providers
  • low cost
  • image quality
  • data storage
  • encryption scheme
  • read write