{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:06:26Z","timestamp":1766066786000},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/trustcom\/bigdatase\/icess.2017.331","type":"proceedings-article","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T20:47:51Z","timestamp":1505162871000},"page":"917-924","source":"Crossref","is-referenced-by-count":10,"title":["Efficient Privacy-Preserving Outsourcing of Large-Scale QR Factorization"],"prefix":"10.1109","author":[{"given":"Changqing","family":"Luo","sequence":"first","affiliation":[]},{"given":"Kaijin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Salinas","sequence":"additional","affiliation":[]},{"given":"Pan","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(93)90493-8"},{"key":"ref11","first-page":"264","article-title":"Direct QR factorisations for tall-and-skinny matrices in MapReduce architectures","author":"benson","year":"2013","journal-title":"Proc IEEE Int Conf Big Data"},{"journal-title":"Introduction to Matrix Computations","year":"1974","author":"stewart","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1370731"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2158001"},{"key":"ref15","first-page":"465","article-title":"Non-interactive verifiable computing: Outsourcing computation to untrusted workers","author":"gennaro","year":"2010","journal-title":"Proc Adv Cryptology (Crypto)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.206"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218476"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/2897845.2897862","article-title":"Efficient secure outsourcing of large-scale quadratic programs","author":"salinas","year":"2016","journal-title":"Proc ACM Asia CCS'16"},{"key":"ref19","article-title":"Akka essentials","author":"gupta","year":"2012","journal-title":"Packt Publishing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2016.2602849"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2013.77"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2009.5309662"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IREP.2013.6629368"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.857383"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.56021\/9781421407944","author":"golub","year":"2013","journal-title":"Matrix Computations"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2012.2196335"},{"key":"ref1","article-title":"Extracting value from chaos","author":"gantz","year":"2011","journal-title":"iDC IView"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.7763\/IJCCE.2013.V2.163"}],"event":{"name":"2017 IEEE Trustcom\/BigDataSE\/ICESS","start":{"date-parts":[[2017,8,1]]},"location":"Sydney, Australia","end":{"date-parts":[[2017,8,4]]}},"container-title":["2017 IEEE Trustcom\/BigDataSE\/ICESS"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8027145\/8029385\/08029534.pdf?arnumber=8029534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T17:16:30Z","timestamp":1692983790000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8029534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/trustcom\/bigdatase\/icess.2017.331","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}