Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4944699 | Information Sciences | 2017 | 37 Pages |
Abstract
Moreover, the protocol does not require public key infrastructures, eliminates user interaction and can outsource expensive computation from a weak computational client to a powerful server, which is suitable for mobile cloud computing.
Related Topics
Physical Sciences and Engineering
Computer Science
Artificial Intelligence
Authors
En Zhang, Fenghua Li, Ben Niu, Yanchao Wang,