Results 31 to 40 of about 1,001 (165)
Secure and Efficient Nearest Neighbor Query for an Outsourced Database
Cloud computing enables resource-constrained clients to outsource their computation-intensive data storage and computation tasks to a cloud server. Although it creates many benefits, data outsourcing causes some security challenges for clients.
Jingjing Guo, Jiacong Sun
doaj +1 more source
Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme
The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare ...
Xiaohui Yang, Chenshuo Zhang
doaj +1 more source
Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users' storage and computation overhead but also preserve the image privacy.
Xiaoqin Feng +4 more
doaj +1 more source
Secure outsourcing of scientific computations [PDF]
We investigate the outsourcing of numerical and scientific computations using the following framework: A customer who needs computations done but lacks the computational resources (computing power, appropriate software, or programming expertise) to do these locally would like to use an external agent to perform these computations. This currently arises
Mikhail J. Atallah +3 more
openaire +1 more source
Although tremendous revolution has been made in the emerging cloud computing technologies over digital devices, privacy gradually becomes a big concern in outsourcing computation. Homomorphic encryption has been proposed to facilitate the preservation of
Jialin Li, Penghao Lu, Xuemin Lin
doaj +1 more source
A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy
Outsourcing computation for genomic data processing offers the ability to allocate massive computing power and storage on demand. Here, Popic and Batzoglou develop a hybrid cloud aligner for sequence read mapping that preserves privacy with competitive ...
Victoria Popic, Serafim Batzoglou
doaj +1 more source
Matrix Multiplication is a basic engineering and scientific problem, which has application in various domains. There exists many cryptographic solutions for secure computation of matrix multiplication, but cryptographic preamble makes them infeasible for
Malay Kumar, Jasraj Meena, Manu Vardhan
doaj +1 more source
An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang +3 more
doaj +1 more source
Protecting genomic data analytics in the cloud: state of the art and opportunities
The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously ...
Haixu Tang +10 more
doaj +1 more source
Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server
Modular exponentiation is one of the most fundamental operations in lots of encryption and signature systems. Due to the heavy computation cost of modular exponentiation, many schemes have been put forward to securely outsource modular exponentiation to ...
Dezhi An, Yan Li, Shengcai Zhang, Jun Lu
doaj +1 more source

