Results 141 to 150 of about 79,561 (230)
Testing and Linkage to Hepatitis C Care From Alternative-to-Incarceration Programs: The Right Place? The Right Time? [PDF]
Rojas Antigua J +3 more
europepmc +1 more source
Post-Quantum Secure Lightweight Revocable IBE with Decryption Key Exposure Resistance. [PDF]
Zhang D, Ju H, Yan Z, Feng S, Li F.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
DSOS: A Distributed Secure Outsourcing System for Edge Computing Service in IoT
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2023Edge computing can help the resource-constrained Internet of Things (IoT) devices to perform some complex tasks. Edge computing has many advantages, such as the distributed architecture, low interaction latency, and good resilience.
Hongjun Li, Jia Yu, Jianxi Fan, Yihai Pi
semanticscholar +1 more source
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators
IEEE Transactions on Dependable and Secure Computing, 2022Since big data becomes a main impetus to the next generation of IT industry, data privacy has received considerable attention in recent years. To deal with the privacy challenges, differential privacy has been widely discussed and related private ...
Jin Li +7 more
semanticscholar +1 more source
Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things
IEEE Internet of Things Journal, 2022With popularity and growth of cloud computing, outsourcing computation, as an important cloud service, has been applied in the field of academic and industry.
Hongjun Li, Fanyu Kong, Jia Yu
semanticscholar +1 more source
Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things
IEEE Internet of Things Journal, 2021With the development of cloud computing and the advent of Internet of Things (IoT), outsourcing computation, as an important application of cloud computing, has been widely researched in the field of academic and industry. The convex optimization problem,
Hongjun Li +3 more
semanticscholar +1 more source
Blockchain-based system for secure outsourcing of bilinear pairings
Information Sciences, 2020Secure computation outsourcing in Internet of Things (IoT) system is an ongoing research challenge, partly due to the resource-constrained nature of most (inexpensive) IoT devices.
Chao Lin +4 more
semanticscholar +1 more source
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things
IEEE Internet of Things Journal, 2020Solving quadratic congruences is a widely applied operation in cryptographic protocols to ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable computation resource for resource-constrained IoT devices when bulk of this ...
Hanlin Zhang +5 more
semanticscholar +1 more source

