Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation
Shanshan Kong; Yongquan Cai; Fei Xue; Haiyang Yu; Allah Ditta
International Journal of Wireless and Mobile Computing (IJWMC), 2018 Vol.14 No.1, pp.90 - 96
13 + 17 =

Thank you for your feedback.