Results 31 to 40 of about 25,319 (281)

Outsourcing Computation: The Minimal Refereed Mechanism [PDF]

open access: yes, 2019
17 pages, 1 figure; WINE 2019: The 15th Conference on Web and Internet ...
Yuqing Kong   +3 more
openaire   +2 more sources

Algorithms for Outsourcing Pairing Computation [PDF]

open access: yes, 2015
We address the question of how a computationally limited device may outsource pairing computation in cryptography to another, potentially malicious, but much more computationally powerful device. We introduce two new efficient protocols for securely outsourcing pairing computations to an untrusted helper.
Guillevic, Aurore, Vergnaud, Damien
openaire   +2 more sources

Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud

open access: yes, 2018
The increasing massive data generated by various sources has given birth to big data analytics. Solving large-scale nonlinear programming problems (NLPs) is one important big data analytics task that has applications in many domains such as transport and
C Wang   +14 more
core   +1 more source

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [PDF]

open access: yes, 2014
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications.
Elmehdwi, Yousef   +2 more
core   +3 more sources

Security Outsourcing Algorithms by Unimodular Matrix Encryption Method

open access: yesJisuanji kexue yu tansuo, 2020
The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied, while its existing problems are also ...
ZHANG Shengxia, TIAN Chengliang
doaj   +1 more source

Securely Outsourcing Large Scale Eigen Value Problem to Public Cloud

open access: yes, 2016
Cloud computing enables clients with limited computational power to economically outsource their large scale computations to a public cloud with huge computational power.
Aktar, Shamminuj   +2 more
core   +1 more source

Verifying Outsourced Computation in an Edge Computing Marketplace

open access: yesMachine Learning & Applications, 2022
An edge computing marketplace could enable IoT devices (Outsourcers) to outsource computation to any participating node (Contractors) in their proximity. In return, these nodes receive a reward for providing computation resources. In this work, we propose a scheme that verifies the integrity of arbitrary deterministic functions in the presence of both ...
Harth-Kitzerow, Christopher   +1 more
openaire   +2 more sources

CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server

open access: yesDigital Communications and Networks, 2017
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest.
Shuai Li   +3 more
doaj   +1 more source

Towards the cloudification of the social networks analytics [PDF]

open access: yes, 2014
In the last years, with the increase of the available data from social networks and the rise of big data technologies, social data has emerged as one of the most profitable market for companies to increase their benefits.
Ayguadé Parra, Eduard   +4 more
core   +1 more source

Multi‐omics and low‐input proteomics profiling reveals dynamic regulation driving pluripotency initiation in early mouse embryos

open access: yesFEBS Open Bio, EarlyView.
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy