@conference{EURECOM+4839,
  author = {Elkhiyaoui, Kaoutar and  Önen, Melek and  Azraoui, Monir and  Molva, Refik},
  title = {Efficient techniques for publicly verifiable delegation of computation},
  booktitle = {ASIACCS 2016, 11th ACM Asia Conference on Computer and Communications Security, May 30-June 3, 2016, Xi\&\#039;ian, China},
  year = {2016},
  editor = {ACM},
  address = {Xi\&\#039;ian},
  note = {© ACM, 2016. This is the author\&\#039;s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ASIACCS 2016, 11th ACM Asia Conference on Computer and Communications Security, May 30-June 3, 2016, Xi\&\#039;ian, China http://dx.doi.org/10.1145/2897845.2897910},
}
