Results 1 to 10 of about 79,541 (210)

Efficient and secure outsourcing of genomic data storage [PDF]

open access: yesBMC Medical Genomics, 2017
Background Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related ...
João Sá Sousa   +6 more
doaj   +3 more sources

SVAT: Secure outsourcing of variant annotation and genotype aggregation [PDF]

open access: yesBMC Bioinformatics, 2022
Background Sequencing of thousands of samples provides genetic variants with allele frequencies spanning a very large spectrum and gives invaluable insight into genetic determinants of diseases.
Miran Kim   +3 more
doaj   +2 more sources

Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud [PDF]

open access: yesSensors, 2021
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj   +2 more sources

Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation [PDF]

open access: yesThe Scientific World Journal, 2014
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario.
Yi Sun   +5 more
doaj   +2 more sources

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation [PDF]

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2017
This is a copy of the author 's final draft version of an article published in the "Journal of ambient intelligence and humanized computing". The final publication is available at Springer via http://dx.doi.org/10.1007/s12652-017-0658-2In this paper two ...
An Wang, Xu   +4 more
core   +3 more sources

Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution

open access: yesIEEE Access, 2019
Discrete Fourier transform (DFT), inverse DFT (IDFT), and circular convolution are important tools for analyzing and designing discrete signals and systems, and are widely used in various industries.
Xiangli Xiao   +3 more
doaj   +2 more sources

A tutorial on secure outsourcing of large-scale computations for big data

open access: yesIEEE Access, 2016
Today's society is collecting a massive and exponentially growing amount of data that can potentially revolutionize scientific and engineering fields, and promote business innovations.
Sergio Salinas   +3 more
doaj   +2 more sources

Secure Outsourcing of Cryptographic Circuits Manufacturing

open access: yesProvable Security, 2018
The fabrication process of integrated circuits (ICs) is complex and requires the use of off-shore foundries to lower the costs and to have access to leading-edge manufacturing facilities. Such an outsourcing trend leaves the possibility of inserting malicious circuitry (a.k.a.
Ateniese, Giuseppe   +4 more
openaire   +4 more sources

Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption [PDF]

open access: yesJisuanji gongcheng, 2018
In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital ...
WU Xinghua,ZHANG Aixin,LI Jianhua
doaj   +1 more source

Using secret sharing for searching in encrypted data [PDF]

open access: yes, 2004
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server.
A. Shamir   +3 more
core   +18 more sources

Home - About - Disclaimer - Privacy