A Note on Two Schemes for Secure Outsourcing of Linear Programming.
Zhengjun CaoLihua LiuPublished in: Int. J. Netw. Secur. (2017)
Keyphrases
- linear programming
- public key encryption
- key management scheme
- information technology
- linear program
- provably secure
- dynamic programming
- information systems
- service providers
- business process
- lightweight
- quadratic programming
- primal dual
- integer programming
- authentication scheme
- network flow
- constraint propagation
- objective function
- security requirements
- ad hoc networks
- key management
- security analysis
- nonlinear programming
- np hard
- user privacy
- optimal solution
- web services