Introduction to Secure Outsourcing Computation
Focuses on the latest technologies and applications of secure outsourcing computations. The book introduces state-of-the-art research for secure outsourcing of some specific functions, such as scientific computations, cryptographic basic operations, and verifiable large database with update.