Efficient Techniques for Publicly Verifiable Delegation of Computation

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva

Journal title: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16

Journal publisher: ACM Press

Published year: 2016

Published pages: 119-128

DOI identifier: 10.1145/2897845.2897910

ISBN: 9781-450342339