Keyphrases
Secure Outsourcing
100%
Verifiable Outsourcing
100%
Mobile Cloud Computing
100%
Exponentiation Operations
100%
Mobile Devices
66%
Exponential Operation
66%
Performance Improvement
33%
Mobile Environment
33%
Performance Gain
33%
Computational Performance
33%
Resource-constrained
33%
Verification Scheme
33%
Verifiability
33%
Compute-intensive Applications
33%
Public Key Cryptosystem
33%
Cryptographic Protocols
33%
Elliptic Curves
33%
Untrusted Server
33%
Modular Exponentiation
33%
Outsourcing Scheme
33%
Modular multiplication
33%
Scalar multiplication
33%
Mobile End
33%
Computer Science
Mobile Device
100%
Mobile Cloud Computing
100%
Intensive Application
50%
Mobile Environment
50%
Performance Gain
50%
Cryptographic Protocol
50%
Elliptic Curve
50%
Public-Key Cryptosystems
50%
Scalar Multiplication
50%
Performance Improvement
50%
Basic Operation
50%