Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited | IEEE Journals & Magazine | IEEE Xplore