{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:46:16Z","timestamp":1761597976033,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422326","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:51:41Z","timestamp":1534805501000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Zhenzhu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Mang","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yongli","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"78","article-title":"Outsourcing large matrix inversion computation to a public cloud","volume":"1","author":"lei","year":"2013","journal-title":"IEEE Transactions on Cloud Computing"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TSC.2014.2331694"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICC.2017.7997106"},{"key":"ref13","article-title":"NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users","author":"fu","year":"2017","journal-title":"IEEE Transactions on Big Data"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICC.2017.7997370"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/COMST.2016.2610963"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIFS.2016.2573770"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ACCESS.2016.2577036"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TSC.2017.2687459"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/GLOCOM.2015.7417184"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/INFOCOM.2015.7218476"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TPDS.2012.206"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.dcan.2017.05.001"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-319-40253-6_18"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1755688.1755695"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/PST.2008.12"},{"key":"ref2","article-title":"RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data","author":"xiong","year":"2017","journal-title":"Mobile Networks and Applications"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ICC.2016.7510991"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICDCSW.2013.13"},{"key":"ref20","first-page":"1","article-title":"Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing","author":"zhang","year":"2017","journal-title":"Proc IEEE GLOBE-COM"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/INFOCOM.2017.8057199"},{"year":"1996","author":"atallah","journal-title":"Secure Outsourcing of Some Computations","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TIFS.2014.2363765"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ACCESS.2016.2535103"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","start":{"date-parts":[[2018,5,20]]},"location":"Kansas City, MO","end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422326.pdf?arnumber=8422326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T05:58:35Z","timestamp":1598248715000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422326","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}