Results 1 to 10 of about 78,996 (280)
SVAT: Secure outsourcing of variant annotation and genotype aggregation [PDF]
Background Sequencing of thousands of samples provides genetic variants with allele frequencies spanning a very large spectrum and gives invaluable insight into genetic determinants of diseases.
Miran Kim +3 more
doaj +2 more sources
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud [PDF]
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj +2 more sources
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation [PDF]
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario.
Yi Sun +5 more
doaj +2 more sources
Efficient and secure outsourcing of genomic data storage [PDF]
Background Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related ...
João Sá Sousa +6 more
doaj +2 more sources
Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption [PDF]
In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital ...
WU Xinghua,ZHANG Aixin,LI Jianhua
doaj +1 more source
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm for improving the speed of common connected ...
Linjie Wang, Youliang Tian, Jinbo Xiong
doaj +1 more source
Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted.
Zhaohui Tang
doaj +1 more source
Using secret sharing for searching in encrypted data [PDF]
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server.
A. Shamir +3 more
core +18 more sources
In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the ...
Rui SUN, You-Liang TIAN
doaj +3 more sources
Privacy-preserving trajectory similarity computation method
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU +4 more
doaj +2 more sources

