{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期-部件”:[[2022,6,28]],“日期-时间”:“2022-06-28T22:42:07Z”,“时间戳”:1656456127789},“引用-计数”:26,“发布者”:“IEEE”,“许可证”:[{“开始”:{“日期-零件”:[[2020,7,1]],”日期-时间“:”2020-07-01T00:00:00 Z“,”timestamp“:1593561600000},”content-version“:”vor“,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2020,7,1]],“date-time”:“2020-07-01T00:00:00Z”,“timestamp”:1593561600000},“content-version”:“stm-asf”,“delay-in-days“:0,”URL“https:\\/doi.org\/10.1525 23\/policy-029“},{“开始”:{“日期部分”:[[2020,7,1]],“date-time”:“2020-07-01T00:00:00Z”,“timestamp”:1593561600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-037”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”shortcontainer-title“:[],”published-print“:{”date-parts“:[2020,7]},“doi”:“10.1109\/infocomwkshps50562.2020.9162946”,“类型”:“procesdings-article”,“created”:{“date-parts”:[[2020,8,10]],“date-time”:“2020-08-10T21:55:09Z”,“timestamp”:1597096509000},“source”:“Crossref”,“is-referenced-by-count”:0,“title”:[“委托计算的合作博弈模型:验证者与计算器分离”],“prefix”:“10.1109”,”author“[{”given“given”:”Duo“,“family”:“Zhang”,“sequence”:“first”,“隶属关系”:[]},{“给定”:“有梁”,“家庭”:“田”,“序列”:“附加”,“隶属”:[]},}“给定的”:“临街”,“家族”:“王”,“顺序”:“额外”,“从属关系”:[]}、{“已知”:“生”,“家人”:“高”,“排序”:“添加”,“归属”:[]}、}“已知的”:[]}],“成员”:“263”,“引用”:[{“key”:“ref10”,“article-title”:“How to Securely Outsourcing Cryptographic Computings”,“author”:“hohenberger”,“year”:“0”,“journal-title“:”Proc Theory of Cryptographic Conference“},{“key”:”ref11“,“artifle-title:”“Securely外包线性代数计算“,”author“:”atallah“,”year“:”0“,”journal-title“:“ACM亚洲通信安全会议论文集”},{“key”:“ref12”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/359168.359176”}:“lei”,“year”:“2013”,“journal title”:“IEEE Transactions on Cloud Computing”},{“key”:“ref15”,“doi asserted by”:“publisher”,“doi”:“10.1109\/TCS.2042.231694”},{“key”:“ref16”,“doi asserted by”:“publisher”,“doi”:“10.1109\/ACCESS.2015.2535103”},{“key”:“ref17”,“doi asserted by”:“publisher”,“doi”:“10.1145\/313956.3134032”},{key”:“参考文献18”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TIFS.2014.2363765”},{“key”:“ref19”,“doi-asserted-by”:”publisher“,”doi“:”10.1109\/TBDATA.2018.2821195 I“:”10.1109\/TSC.2012.36“},{“key”:“ref6”,“doi-asserted-by”:“publisher”,“DOI”:“10.1007\/978-3-642-14623-7_25”},{“key”:“ref5”,“article-title”:“安全计算协议(广泛摘要)”,“author”:“yao”,“year”:“0”,“journal-title“:“计算机科学基础研讨会论文集”}tle“:“使用完全同态加密改进计算委派”,“author”:“chung”,“year”:“0”,“journal-title”:“密码学进展国际会议”},{“key”:“ref2”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1721654.1721672”},“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TSC.2017.2711009”},{“key”:“ref20”,“doi-asserted-by”:”publisher“,”doi“:”10.1109\/TDSC.2015.2507120“},}“key:”ref22“,”doi-assert-by“:”publicher“,”doi“:,“doi”:“10.1109\/AINA.2009.133”},{“key”:“ref24”,“doi-asserted-by”:“publisher”,“DOI”:“10.1109\/ICDCS.2004.1281562”},{“key”:“ref23”,“article-title”:“不可加热的分布式计算”,“author”:“golle”,”year“:“2001”,“journal-title“:”Topics in Cryptology-CT-RSA“},”{“key”:“ref26”,“article-title”:“面对共谋的外包计算激励工程”,“author”:“khouzani”,“year”:“0”,“日记标题”:“WEIS”},{“key”:“ref25”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/GLOCOM.2017.8254090”}],“event”:{“name”:“IEEE INFOCOM 2020-IEEE计算机通信研讨会(INFOCOM WKSHPS)”,“location”:“加拿大安大略省多伦多”,“start”:{“date-parts”:[2020,7,6]},“end”:{“date-parts”:[[2020,7,9]]}},集装箱装载机”:[“IEEE INFOCOM 2020-IEEE计算机通信研讨会(INFOCOM WKSHPS)”],“original-title”:[],“link”:[{“URL”:“http://\/xplorestaging.IEEE.org\/ielx7\/9146478\/9162946.pdf?arnumber=9162946”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,6,28]],“日期时间”:“2022-06-28T21:58:09Z”,“时间戳”:1656453489000},“分数”:1,“资源”:{“主要”:{“URL”:“https:\/\/ieeexplore.ieee.org\/document\/9162946\/”}},”副标题“:[],”短标题“:[],”已发布“:{”日期部分“:[2020,7]]},‘引用计数’:26,”URL“http:”\/\/dx.doi.org\/10.109 \/infocomwkshps50562.2020.9162946“,”关系“:{},“主题”:[],“发布”:{“日期部分”:[[2020,7]]}}