Login / Signup
A Comprehensive Survey on Secure Outsourced Computation and Its Applications.
Yang Yang
Xindi Huang
Ximeng Liu
Hongju Cheng
Jian Weng
Xiangyang Luo
Victor Chang
Published in:
IEEE Access (2019)
Keyphrases
</>
key management
real time
data sets
service providers
third party
neural network
genetic algorithm
wireless sensor networks
distributed systems
project management
security issues
standard model
cryptographic protocols