**Chapter 5**

References

[1] Griffin D. Report on the public consultation for H2020 Work

[2] Jeffery K, Schubert L. Complete computing: Toward information, incentive and intention. Tech. rep., DG

[3] Hsieh A. Direct numerical simulation of complex turbulence [PhD thesis].

and software. Tech. Rep., DG

University of Colorado; 2017

[4] Alfonsi G. On direct numerical simulation of turbulent flows. Applied Mechanics Reviews. 2011;64:0802-0803

[5] Landahl MT, Mollo-Christensen E. Turbulence and Random Processes in Fluid Mechanics. 2nd ed. Cambridge, UK: Cambridge University Press; 1992

[6] Belytschko T, Rabczuk T, Huerta A,

[7] Lei X, Liao X, Huang T, Li H, Hu C. Outsourcing large matrix inversion computation to a public cloud. IEEE Transactions on Cloud Computing.

[8] Kumar M, Meena J, and Vardhan M, Secure amp;amp; efficient delegation of system of linear equation to a malicious cloud server. In: 2017 4th International

Communication Systems (ICECS); Feb

[9] Chen F, Xiang T, Lei X, Chen J. Highly efficient linear regression outsourcing to a cloud. IEEE Transactions on Cloud Computing.

Conference on Electronics and

Fernández-Méndez S. Meshfree Methods, Ch. 10. Atlanta, GA, USA: American Cancer Society; 2004

2013;1(1):1

2017. pp. 12-17

2014;2:499-508

74

CONNECT E.2. 2014

CONNECT E.2. 2014

Programme 2016–17: Cloud computing

Modern Cryptography – Current Challenges and Solutions

[10] Wang C, Ren K, Wang J, Wang Q. Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Transactions on Parallel and Distributed Systems. 2013;24:

[11] Chen F, Xiang T, Yang Y. Privacypreserving and verifiable protocols for scientific computation outsourcing to the cloud. Journal of Parallel and Distributed Computing. 2014;74(3):

[12] Zhou L, Zhu Y, Choo K-KR. Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future

Generation Computer Systems. 2018;81:

[13] Lei X, Liao X, Huang T, Heriniaina F. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Information Sciences. 2014;280:205-217

[14] Kong S, Cai Y, Xue F, Yu H, Ditta A. Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity

transformation. International Journal of Wireless and Mobile Computing. 2018;

[15] Lei X, Liao X, Huang T, Li H. Cloud computing service: The case of large matrix determinant computation. IEEE Transactions on Services Computing.

[16] Pramkaew C, Ngamsuriyaroj S. Lightweight scheme of secure outsourcing svd of a large matrix on cloud. Journal of Information Security and Applications. 2018;41:92-102

1172-1181

2141-2151

404-413

14(1):90-96

2015;8:688-700
