Results 1 to 10 of about 25,319 (281)
Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa +4 more
core +3 more sources
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj +3 more sources
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario.
Yi Sun +5 more
doaj +1 more source
With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use ...
Shengxia Zhang +4 more
doaj +1 more source
Verifiable Summation of Read-Once Formula Specified Data
Securely outsourcing computation to untrusted cloud servers has attracted a lot of attention in recent years. In this paper we consider datasets where every item is labeled by a number of attributes and study the problem of securely outsourcing the ...
Yan He, Liang Feng Zhang
doaj +1 more source
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj +1 more source
Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments [PDF]
For the past decade, query processing on relational data has been studied extensively, and many theoretical and practical solutions to query processing have been proposed under various scenarios.
Elmehdwi, Yousef +2 more
core +3 more sources
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing
Yang Yang, Guanghua Song
doaj +1 more source
Non-Cooperative Rational Interactive Proofs [PDF]
Interactive-proof games model the scenario where an honest party interacts with powerful but strategic provers, to elicit from them the correct answer to a computational question.
Chen, Jing +2 more
core +2 more sources
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and ...
Changlu Lin +3 more
doaj +1 more source

