Results 61 to 70 of about 25,319 (281)
Abstract Outsourcing pest and disease control (PDC) has grown rapidly worldwide, especially in developing countries. Although numerous studies have investigated various advantages of outsourcing PDC, little is known about its impact on pesticide expenditure.
Pengcheng Wang +2 more
wiley +1 more source
Matrix Multiplication is a basic engineering and scientific problem, which has application in various domains. There exists many cryptographic solutions for secure computation of matrix multiplication, but cryptographic preamble makes them infeasible for
Malay Kumar, Jasraj Meena, Manu Vardhan
doaj +1 more source
Foreign labor, peer‐networking and agricultural efficiency in the Italian dairy sector
Abstract While the presence of immigrants in the agricultural sector is widely acknowledged, the empirical evidence on its economic consequences is lacking, especially from a microeconomic perspective. Using the Farm Accountancy Data Network panel data for Italian dairy farms in the period 2008–2018, the present study investigates the relationship ...
Federico Antonioli +2 more
wiley +1 more source
An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang +3 more
doaj +1 more source
Protecting genomic data analytics in the cloud: state of the art and opportunities
The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously ...
Haixu Tang +10 more
doaj +1 more source
Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server
Modular exponentiation is one of the most fundamental operations in lots of encryption and signature systems. Due to the heavy computation cost of modular exponentiation, many schemes have been put forward to securely outsource modular exponentiation to ...
Dezhi An, Yan Li, Shengcai Zhang, Jun Lu
doaj +1 more source
Substring-searchable attribute-based encryption and its application for IoT devices
With the development of big data and cloud computing technology, more and more users choose to store data on cloud servers, which brings much convenience to their management and use of data, and also the risk of data leakage.
Xi Sun +6 more
doaj +1 more source
Privacy Preserving Data Mining by Using Implicit Function Theorem
Data mining has made broad significant multidisciplinary field used in vast application domains and extracts knowledge by identifying structural relationship among the objects in large data bases.
Narsimha, Gugulothu, Rajesh, Pasupuleti
core +1 more source
Smart Contracts for Incentivized Outsourcing of Computation
Outsourcing computation allows a resource limited client to expand its computational capabilities by outsourcing computation to other computing nodes or clouds. A basic requirement of outsourcing is providing assurance that the computation result is correct.
Kupcu, Alptekin, Safavi-Naini, Reihaneh
openaire +2 more sources
Access to Finance and Innovation in the Canadian Food Processing
ABSTRACT Innovation is a presumed channel through which finance affects productivity, yet there is limited research testing the relationship between finance and innovation in the food manufacturing sector. The purpose of the paper is to explore the determinants (e.g., financing, R&D, firm size, expenditure on innovation) of the adoption of innovation ...
Getu Hailu, Deepananda Herath
wiley +1 more source

