Results 1 to 10 of about 25,319 (281)

Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]

open access: yes, 2014
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa   +4 more
core   +3 more sources

Secure efficient and verifiable large linear equations solve outsourcing computing scheme

open access: yes网络与信息安全学报, 2017
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj   +3 more sources

Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

open access: yesThe Scientific World Journal, 2014
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario.
Yi Sun   +5 more
doaj   +1 more source

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method

open access: yesIEEE Access, 2019
With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use ...
Shengxia Zhang   +4 more
doaj   +1 more source

Verifiable Summation of Read-Once Formula Specified Data

open access: yesIEEE Access, 2020
Securely outsourcing computation to untrusted cloud servers has attracted a lot of attention in recent years. In this paper we consider datasets where every item is labeled by a number of attributes and study the problem of securely outsourcing the ...
Yan He, Liang Feng Zhang
doaj   +1 more source

Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud

open access: yesSensors, 2021
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj   +1 more source

Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments [PDF]

open access: yes, 2013
For the past decade, query processing on relational data has been studied extensively, and many theoretical and practical solutions to query processing have been proposed under various scenarios.
Elmehdwi, Yousef   +2 more
core   +3 more sources

Enhancing Privacy Preservation in Verifiable Computation through Random Permutation Masking to Prevent Leakage

open access: yesInformation, 2023
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing
Yang Yang, Guanghua Song
doaj   +1 more source

Non-Cooperative Rational Interactive Proofs [PDF]

open access: yes, 2019
Interactive-proof games model the scenario where an honest party interacts with powerful but strategic provers, to elicit from them the correct answer to a computational question.
Chen, Jing   +2 more
core   +2 more sources

A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

open access: yesIEEE Access, 2018
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and ...
Changlu Lin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy