Abstract
We consider a scenario in which a data owner outsources storage of a large graph to an untrusted server; the server performs computations on this grap......
小提示:本篇文献需要登录阅读全文,点击跳转登录