Sign in

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.

Yujue WangQianhong WuDuncan S. WongBo QinSherman S. M. ChowZhen LiuXiao Tan
Published in: ESORICS (1) (2014)
Keyphrases
  • cloud storage
  • information systems
  • third party
  • cloud computing
  • databases
  • sensitive data