Login / Signup
Incentivized Outsourced Computation Resistant to Malicious Contractors.
Alptekin Küpçü
Published in:
IEEE Trans. Dependable Secur. Comput. (2017)
Keyphrases
</>
databases
service providers
third party
database
machine learning
information retrieval
decision trees
search algorithm
end users
efficient computation
malicious attacks