Cited By
View all- Xie DYang HQin JMa J(2019)Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious CloudInternational Journal of Digital Crime and Forensics10.4018/IJDCF.201910010211:4(14-27)Online publication date: 1-Oct-2019
- Ahmad HWang LHong HLi JDawood HAhmed MYang Y(2018)Primitives towards verifiable computationFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6148-412:3(451-478)Online publication date: 1-Jun-2018
- Tan CJiang ZWang XYiu SFang JLi JJin YHuang JChen XWang XHuang X(2016)Generic Construction of Publicly Verifiable Predicate EncryptionProceedings of the 11th ACM on Asia Conference on Computer and Communications Security10.1145/2897845.2897919(889-894)Online publication date: 30-May-2016
- Show More Cited By