Results 11 to 20 of about 28,164 (210)

Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud [PDF]

open access: yesSensors, 2021
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj   +3 more sources

Identity-based controlled delegated outsourcing data integrity auditing scheme [PDF]

open access: yesScientific Reports
With the continuous development of cloud computing, the application of cloud storage has become more and more popular. To ensure the integrity and availability of cloud data, scholars have proposed several cloud data auditing schemes.
Jianming Du   +4 more
doaj   +2 more sources

Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

open access: yesFuture Internet, 2023
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song   +5 more
doaj   +1 more source

Lattice-Based Cryptanalysis on Outsourcing Scheme of Modular Exponentiations ExpSOS [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
With the popularity of cloud computing, outsourcing computing, as an important form of cloud service, has attracted more and more attention from academia and industry.
ZHENG Yunhai, TIAN Chengliang
doaj   +1 more source

Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme

open access: yes网络与信息安全学报, 2016
In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the ...
Rui SUN, You-Liang TIAN
doaj   +3 more sources

Survey on the Priority Factors Influencing IT Outsourcing in the Platform of Cloud Computing in Semnan Province Universities by Fuzzy DEMATEL Technique [PDF]

open access: yesJournal of Information Technology Management, 2015
Today, Information Technology Outsourcing (ITO) has developed and caused organizations to become more flexible and dynamic than they were before. The ever-increasing development of ICT is one of the main reasons for the promotion of outsourcing.
Mir Saeed Shafaee Tonekaboni   +2 more
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud

open access: yesIEEE Access, 2020
Outsourcing computing is an application of cloud computing. It is an important method to solve the problem of client resource limitation. However, outsourcing computing brings security and efficiency challenges.
Yu Wu   +3 more
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation [PDF]

open access: yesThe Scientific World Journal, 2014
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two ...
Yi Sun   +5 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy