[1] JOSHI K P,YEAHA Y,FININ T. Automating cloud services life cycle through semantic technologies[J]. IEEE Transactions on Services Computing,2014,7(1):109-122. [2] ZHENG W,XU P,HUANG X,et al. Design a cloud storage platform for pervasive computing environments[J]. Cluster Computing,2010,13(2):141-151. [3] REN K,WANG C,WANG Q. Security challenges for the public cloud[J]. IEEE Internet Computing,2012,16(1):69-73. [4] 方保镕, 周继东, 李医民. 矩阵论[M]. 2版. 北京:清华大学出版社,2013:176-177.(FANG B R,ZHOU J M,LI Y M. Matrix Theory[M]. 2nd Ed. Beijing:Tsinghua University Press,2013:176-177.) [5] STORJOHANN A. Integer matrix rank certification[C]//Proceedings of the 2009 International Symposium on Symbolic and Algebraic Computation. New York:ACM,2009:333-340. [6] WILLIAMS V V. Multiplying matrices faster than coppersmithwinograd[C]//Proceedings of the 44th Annual ACM Symposium on Theory of Computing. New York:ACM,2012:887-898. [7] ATALLAH M,PANTAZOPOULOS K N,RICE J R,et al. Secure outsourcing of scientific computations[J]. Journal of Advances in Computers,2002,54:215-272. [8] LEI X,LIAO X,HUANG T,et al. Outsourcing large matrix inversion computation to a public cloud[J]. IEEE Transactions on Cloud Computing,2013,1(1):78-87. [9] LEI X,LIAO X,HUANG T,et al. Achieving security,robust cheating resistance,and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud[J]. Information Sciences,2014,280:205-217. [10] LEI X,LIAO X,MA X,et al. Securely and efficiently perform large matrix rank decomposition computation via cloud computing[J]. Cluster Computing,2015,18(2):989-997. [11] ZHOU L,LI C. Outsourcing eigen-decomposition and singular value decomposition of large matrix to a public cloud[J]. IEEE Access,2016,4:869-879. [12] ZHOU L,ZHU Y,CHOO K K R. Efficiently and securely harnessing cloud to solve linear regression and other matrix operations[J]. Future Generation Computer Systems,2017,81:404-413. [13] LUO C,ZHANG K,SALINAS S,et al. SecFact:secure largescale QR and LU factorizations[J]. IEEE Transactions on Big Data,2017(Early Access):1. [14] ZHANG S,TIAN C,ZHANG H,et al. Practical and secure outsourcing algorithms of matrix operations based on a novel matrix encryption method[J]. IEEE Access,2019,7:53823-53838. [15] XIANG C,TANG C. Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server[J]. Journal of Ambient Intelligence and Humanized Computing, 2015,6(1):131-139. [16] TIAN C,YU J,ZHANG H,et al. Novel secure outsourcing of modular inversion for arbitrary and variable modulus[J]. IEEE Transactions on Services Computing,2019(Early Access):1. [17] 晋慧峰, 杨晋. 行(列)满秩阵的几个性质[J]. 太原重型机械学院学报,1996,17(2):123-127.(JIN H F,YANG J. Some properties of row(column) full rank matrix[J]. Journal of Taiyuan Heavy Machinery Institute,1996,17(2):123-127.) [18] 同济大学数学系. 工程数学:线性代数[M]. 6版. 北京:高等教育出版社,2014:67-68.(Department of Mathematics of Tongji University. Engineering Mathematics Linear Algebra[M]. 6th ed. Beijing:Higher Education Press,2014:67-68.) [19] WILLIAM W H. Updating the inverse of a matrix[J]. SIAM Review,1989,31(2):221-239. |