Results 11 to 20 of about 25,319 (281)
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm for improving the speed of common connected ...
Linjie Wang, Youliang Tian, Jinbo Xiong
doaj +3 more sources
Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing [PDF]
The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and fog computing-enabled connected devices and nodes has changed our lifestyle nowadays. Due to this, the increased rate of device sales and utilization increases
Abdullah Ayub Khan +6 more
doaj +3 more sources
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song +5 more
doaj +3 more sources
Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids [PDF]
With the development of the Internet of Things, smart grids have become indispensable in our daily life and can provide people with reliable electricity generation, transmission, distribution and control.
Feng Zhai +3 more
doaj +2 more sources
Efficiently Outsourcing Multiparty Computation Under Multiple Keys [PDF]
Secure multiparty computation enables a set of users to evaluate certain functionalities on their respective inputs while keeping these inputs encrypted throughout the computation. In many applications, however, outsourcing these computations to an untrusted server is desirable, so that the server can perform the computation on behalf of the users ...
Peter, Andreas +2 more
openaire +3 more sources
Optimal Contracts for Outsourced Computation [PDF]
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., “lazy-but-honest” contractors.
H. Chen, R. Gennaro, R. Nix, U. Maurer
core +5 more sources
A potential game-based outsourcing computation framework for multiple calculators
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server. The traditional outsourcing computation model forbids communication between players, but it has little ...
Duo Zhang, Youliang Tian, Linjie Wang
doaj +1 more source
The continuous production of large-scale data makes data outsourcing computation a trend. In order to ensure that data outsourcing transaction is trusted and fair, it needs the supervision and judgment of a third party.
Lina Li +4 more
doaj +1 more source
Privacy-Preserving Outsourced Computation Scheme for Accurate Shortest Distance of Graph Data [PDF]
The widely used massive graph data, such as the ones used for social networks, communication networks, and bioproteins, contain large amount of private and sensitive personal and commercial information; therefore, it is essential to encrypt such graph ...
Yingying YU, Hongfa DING, Heling JIANG
doaj +1 more source
Practical Secure Computation Outsourcing [PDF]
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outsource large-scale computational tasks to a cloud. Nonetheless, the issue of security and privacy becomes
Zihao Shan +3 more
openaire +1 more source

