2016
DOI: 10.1186/s40537-016-0047-2
|View full text |Cite
|
Sign up to set email alerts
|

Optimized relativity search: node reduction in personalized page rank estimation for large graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Next in Fog, decryption technique the intermediate cipher is computed by using client key. Finally, the client decryption [32][33][34][35][36][37][38][39][40][41][42] technique gets the intermediate cipher from the private key and original message is obtained. They compared their technique with RSA technique.…”
Section: Data and Cryptographic Based Security Techniquementioning
confidence: 99%
“…Next in Fog, decryption technique the intermediate cipher is computed by using client key. Finally, the client decryption [32][33][34][35][36][37][38][39][40][41][42] technique gets the intermediate cipher from the private key and original message is obtained. They compared their technique with RSA technique.…”
Section: Data and Cryptographic Based Security Techniquementioning
confidence: 99%
“…Through these financial support, the following articles have been published [28][29][30][31][32][33][34][35][36][37][38][39][40][41][42].…”
Section: Acknowledgementsmentioning
confidence: 99%
“…Through these financial support, the following articles have been published [31][32][33][34][35][36][37][38][39].…”
Section: Acknowledgementsmentioning
confidence: 99%