Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
MetadataShow full item record
Items in KU ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
We want to hear from you! Please share your stories about how Open Access to this item benefits YOU.