Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud.
Xinyu LeiXiaofeng LiaoTingwen HuangFeno HeriniainaPublished in: Inf. Sci. (2014)
Keyphrases
- high efficiency
- matrix multiplication
- high accuracy
- real and synthetic datasets
- message passing
- information security
- malicious users
- matrix factorization
- cloud computing
- information technology
- information systems
- service providers
- computer vision
- intrusion detection
- access control
- density based clustering
- network security
- image processing
- computing infrastructure