Login / Signup

Incentivized Outsourced Computation Resistant to Malicious Contractors.

Alptekin Küpçü
Published in: IEEE Trans. Dependable Secur. Comput. (2017)
Keyphrases
  • databases
  • service providers
  • third party
  • database
  • machine learning
  • information retrieval
  • decision trees
  • search algorithm
  • end users
  • efficient computation
  • malicious attacks