Results 61 to 70 of about 1,001 (165)

A Hardware-Based Correct Execution Environment Supporting Virtual Memory

open access: yesIEEE Access
The rapid increase in data generation has led to outsourcing computation to cloud service providers, allowing clients to handle large tasks without investing resources.
Daehyeon Lee   +8 more
doaj   +1 more source

Fair Marketplace for Secure Outsourced Computations

open access: yes, 2018
The cloud computing paradigm offers clients ubiquitous and on demand access to a shared pool of computing resources, enabling the clients to provision scalable services with minimal management effort. Such a pool of resources, however, is typically owned and controlled by a single service provider, making it a single-point-of-failure.
Dang, Hung   +2 more
openaire   +2 more sources

Verifiable Computation on Outsourced Encrypted Data

open access: yes, 2014
On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authenticator, such as homomorphic signature with public verifiability and homomorphic MAC with private verifiability, guarantees authenticity of ...
LAI, Junzuo   +3 more
openaire   +3 more sources

Efficient and fully outsourced privacy-preserving decision tree training and prediction based on homomorphic encryption

open access: yesEgyptian Informatics Journal
Outsourcing machine learning models to cloud servers allows data owners to train and utilize models without investing in dedicated hardware. However, this approach raises significant concerns regarding the proprietary nature of the models and the data ...
Nawal Almutairi
doaj   +1 more source

Outsourcing computation on encrypted data

open access: yes, 2017
Nowadays, encryption and services issued of ``big data" are at odds. Indeed, encryption is about protecting users privacy, while big data is about analyzing users data. Being increasingly concerned about security, users tend to encrypt their sensitive data that are subject to be accessed by other parties, including service providers.
openaire   +1 more source

KmerCrypt: private k-mer search with homomorphic encryption. [PDF]

open access: yesBrief Bioinform
Provatas K   +2 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy