Sign in to My TN
Terkko Navigator
/ Feeds
Feeds
Journals
Books
Databases & Sites
Profiles
Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud
Added 677 days ago (18.08.2020)
Authors:
Su Q, Zhang R, Xue R.
Journal:
Computer Journal
Google Translate
Read article