Results 1 to 10 of about 78,996 (280)

SVAT: Secure outsourcing of variant annotation and genotype aggregation [PDF]

open access: yesBMC Bioinformatics, 2022
Background Sequencing of thousands of samples provides genetic variants with allele frequencies spanning a very large spectrum and gives invaluable insight into genetic determinants of diseases.
Miran Kim   +3 more
doaj   +2 more sources

Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud [PDF]

open access: yesSensors, 2021
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj   +2 more sources

Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation [PDF]

open access: yesThe Scientific World Journal, 2014
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario.
Yi Sun   +5 more
doaj   +2 more sources

Efficient and secure outsourcing of genomic data storage [PDF]

open access: yesBMC Medical Genomics, 2017
Background Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related ...
João Sá Sousa   +6 more
doaj   +2 more sources

Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption [PDF]

open access: yesJisuanji gongcheng, 2018
In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital ...
WU Xinghua,ZHANG Aixin,LI Jianhua
doaj   +1 more source

Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT

open access: yesDigital Communications and Networks, 2022
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm for improving the speed of common connected ...
Linjie Wang, Youliang Tian, Jinbo Xiong
doaj   +1 more source

Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme

open access: yesIEEE Access, 2021
Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted.
Zhaohui Tang
doaj   +1 more source

Using secret sharing for searching in encrypted data [PDF]

open access: yes, 2004
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server.
A. Shamir   +3 more
core   +18 more sources

Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme

open access: yes网络与信息安全学报, 2016
In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the ...
Rui SUN, You-Liang TIAN
doaj   +3 more sources

Privacy-preserving trajectory similarity computation method

open access: yesTongxin xuebao, 2022
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy