2015
DOI: 10.14257/ijgdc.2015.8.1.22
|View full text |Cite
|
Sign up to set email alerts
|

Research on Task Scheduling Convergence Non-Dominated Sorting Method in Cloud Computing

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
(7 reference statements)
0
1
0
Order By: Relevance
“…If the attacker gets all these encrypted data, he cannot decrypt and get the original plaintext data between the client and the server. This also makes sure that even the processor cannot access the information of the data [30]. The algorithms begin with initialization and outputs from the central authentication center the pair of public and key keys, the master key of the center, the public key of the system, and the common parameters.…”
Section: Medical Data Privacy Protection Schemementioning
confidence: 99%
“…If the attacker gets all these encrypted data, he cannot decrypt and get the original plaintext data between the client and the server. This also makes sure that even the processor cannot access the information of the data [30]. The algorithms begin with initialization and outputs from the central authentication center the pair of public and key keys, the master key of the center, the public key of the system, and the common parameters.…”
Section: Medical Data Privacy Protection Schemementioning
confidence: 99%