Results 161 to 170 of about 79,561 (230)
Some of the next articles are maybe not open access.
IEEE Transactions on Services Computing
Secure storage and content-based retrieval of images on third-party servers without compromising privacy and efficiency is a challenging research problem.
A. J., S. R.
semanticscholar +1 more source
Secure storage and content-based retrieval of images on third-party servers without compromising privacy and efficiency is a challenging research problem.
A. J., S. R.
semanticscholar +1 more source
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus
IEEE Transactions on Services Computing, 2019In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular ...
Chengliang Tian +5 more
semanticscholar +1 more source
Privacy-Preserving Multi-Range Queries for Secure Data Outsourcing Services
IEEE Transactions on Cloud Computing, 2023Encrypted range query schemes that enable range-based searches over encrypted data have become an effective solution for secure data outsourcing services. However, existing schemes are still inadequate on desired functionality and security. Specifically,
Yu Guo +3 more
semanticscholar +1 more source
Proceedings of the 11th Central & Eastern European Software Engineering Conference in Russia, 2015
Outsourcing data and IT infrastructure can be profitable for business, but it raises severe privacy issues. Ordinary encryptions partially solve the problem, but they limits operations, which can be performed over encrypted data. In this paper, we propose solution focused on securing outsourced database content using proprietary developed Order ...
Kirill Shatilov +4 more
openaire +1 more source
Outsourcing data and IT infrastructure can be profitable for business, but it raises severe privacy issues. Ordinary encryptions partially solve the problem, but they limits operations, which can be performed over encrypted data. In this paper, we propose solution focused on securing outsourced database content using proprietary developed Order ...
Kirill Shatilov +4 more
openaire +1 more source
Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data
IEEE Transactions on Big Data, 2019Big data has become a key basis of innovation and intelligence, potentially making our lives more convenient and bringing new opportunities to the modern society.
Weixian Liao +3 more
semanticscholar +1 more source
Secure Outsourcing of Multi-armed Bandits
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020We consider the problem of cumulative reward maximization in multi-armed bandits. We address the security concerns that occur when data and computations are outsourced to an honest-but-curious cloud i.e., that executes tasks dutifully, but tries to gain as much information as possible.
Ciucanu, Radu +3 more
openaire +2 more sources
2020
The phrase outsourcing war has been used since the late 1990s to describe the trend toward the hiring of private military and security companies (PMSCs) by national governments to perform functions that previously had been assigned only to members of national military forces.
Ori Swed, Daniel Burland
openaire +1 more source
The phrase outsourcing war has been used since the late 1990s to describe the trend toward the hiring of private military and security companies (PMSCs) by national governments to perform functions that previously had been assigned only to members of national military forces.
Ori Swed, Daniel Burland
openaire +1 more source
Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing
IEEE Transactions on Mobile ComputingWith the increasing awareness of secure data outsourcing, dynamic searchable symmetric encryption (DSSE) that enables searches and updates over encrypted data has begun to receive growing attention.
Qin Liu +6 more
semanticscholar +1 more source
Armed Forces & Society, 2013
Since the end of the Cold War, there has been an exponential growth in the use of private military and security companies. Few have debated the long-term consequences outsourcing of security holds for the military profession. The first section of this article outlines the evolution of military outsourcing. From here the focus shifts to how outsourcing
openaire +1 more source
Since the end of the Cold War, there has been an exponential growth in the use of private military and security companies. Few have debated the long-term consequences outsourcing of security holds for the military profession. The first section of this article outlines the evolution of military outsourcing. From here the focus shifts to how outsourcing
openaire +1 more source
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain
IEEE Transactions on Information Forensics and SecurityExisting multitask outsourcing computations struggle to guarantee the fairness for participants and the correctness of the computation results. Some solutions use blockchain to address the fairness issue in outsourcing computations.
Lijuan Huo +5 more
semanticscholar +1 more source

