Secure Computation Outsourcing
University of Alabama at Birmingham
Birmingham, Alabama
University of Alabama at Birmingham
Birmingham, Alabama
CONTENTS
22.2.1 Cloud-Based Computation Outsourcing
22.2.2 Computations that can be Outsourced to Clouds
22.2.2.4 Modular Exponentiation
22.2.3 Secure Computation Outsourcing to Clouds
22.2.3.2 Properties for Secure Computation Outsourcing
22.3.3 Vulnerability in Cloud Architectures
Get Cloud Computing Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.