Year | Venue | Field |
---|---|---|
2017 | I. J. Network Security | Outsourcing computation,Computer science,Verifiable secret sharing,Modular design,Operating system,Distributed computing |
DocType | Volume | Issue |
Journal | 19 | 3 |
Citations | PageRank | References |
3 | 0.39 | 5 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jianxing Cai | 1 | 3 | 0.39 |
Yanli Ren | 2 | 247 | 24.83 |
Tiejin Jiang | 3 | 3 | 0.39 |