Results 141 to 150 of about 79,561 (230)

Secure Outsourcing of Some Computations

open access: yes, 1996
Atallah, Mikhail J.   +2 more
openaire   +1 more source

DSOS: A Distributed Secure Outsourcing System for Edge Computing Service in IoT

IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2023
Edge computing can help the resource-constrained Internet of Things (IoT) devices to perform some complex tasks. Edge computing has many advantages, such as the distributed architecture, low interaction latency, and good resilience.
Hongjun Li, Jia Yu, Jianxi Fan, Yihai Pi
semanticscholar   +1 more source

Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators

IEEE Transactions on Dependable and Secure Computing, 2022
Since big data becomes a main impetus to the next generation of IT industry, data privacy has received considerable attention in recent years. To deal with the privacy challenges, differential privacy has been widely discussed and related private ...
Jin Li   +7 more
semanticscholar   +1 more source

Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things

IEEE Internet of Things Journal, 2022
With popularity and growth of cloud computing, outsourcing computation, as an important cloud service, has been applied in the field of academic and industry.
Hongjun Li, Fanyu Kong, Jia Yu
semanticscholar   +1 more source

Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things

IEEE Internet of Things Journal, 2021
With the development of cloud computing and the advent of Internet of Things (IoT), outsourcing computation, as an important application of cloud computing, has been widely researched in the field of academic and industry. The convex optimization problem,
Hongjun Li   +3 more
semanticscholar   +1 more source

Blockchain-based system for secure outsourcing of bilinear pairings

Information Sciences, 2020
Secure computation outsourcing in Internet of Things (IoT) system is an ongoing research challenge, partly due to the resource-constrained nature of most (inexpensive) IoT devices.
Chao Lin   +4 more
semanticscholar   +1 more source

Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things

IEEE Internet of Things Journal, 2020
Solving quadratic congruences is a widely applied operation in cryptographic protocols to ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable computation resource for resource-constrained IoT devices when bulk of this ...
Hanlin Zhang   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy