Login / Signup
Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation.
Shanshan Kong
Yongquan Cai
Fei Xue
Haiyang Yu
Allah Ditta
Published in:
Int. J. Wirel. Mob. Comput. (2018)
Keyphrases
</>
matrix multiplication
security protocols
message passing
similarity measure
distributed memory
artificial immune algorithm
security services
information systems
cloud computing
cryptographic algorithms
authentication protocol
data processing
matrix factorization
peer to peer
security mechanisms