Results 161 to 170 of about 79,561 (230)
Some of the next articles are maybe not open access.

A Secure Image Outsourcing Using Privacy-Preserved Local Color Layout Descriptor in Cloud Environment

IEEE Transactions on Services Computing
Secure storage and content-based retrieval of images on third-party servers without compromising privacy and efficiency is a challenging research problem.
A. J., S. R.
semanticscholar   +1 more source

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus

IEEE Transactions on Services Computing, 2019
In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained clients (e.g., mobile devices and IC cards) since modular ...
Chengliang Tian   +5 more
semanticscholar   +1 more source

Privacy-Preserving Multi-Range Queries for Secure Data Outsourcing Services

IEEE Transactions on Cloud Computing, 2023
Encrypted range query schemes that enable range-based searches over encrypted data have become an effective solution for secure data outsourcing services. However, existing schemes are still inadequate on desired functionality and security. Specifically,
Yu Guo   +3 more
semanticscholar   +1 more source

Securing outsourced database

Proceedings of the 11th Central & Eastern European Software Engineering Conference in Russia, 2015
Outsourcing data and IT infrastructure can be profitable for business, but it raises severe privacy issues. Ordinary encryptions partially solve the problem, but they limits operations, which can be performed over encrypted data. In this paper, we propose solution focused on securing outsourced database content using proprietary developed Order ...
Kirill Shatilov   +4 more
openaire   +1 more source

Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data

IEEE Transactions on Big Data, 2019
Big data has become a key basis of innovation and intelligence, potentially making our lives more convenient and bringing new opportunities to the modern society.
Weixian Liao   +3 more
semanticscholar   +1 more source

Secure Outsourcing of Multi-armed Bandits

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020
We consider the problem of cumulative reward maximization in multi-armed bandits. We address the security concerns that occur when data and computations are outsourced to an honest-but-curious cloud i.e., that executes tasks dutifully, but tries to gain as much information as possible.
Ciucanu, Radu   +3 more
openaire   +2 more sources

Outsourcing War and Security

2020
The phrase outsourcing war has been used since the late 1990s to describe the trend toward the hiring of private military and security companies (PMSCs) by national governments to perform functions that previously had been assigned only to members of national military forces.
Ori Swed, Daniel Burland
openaire   +1 more source

Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing

IEEE Transactions on Mobile Computing
With the increasing awareness of secure data outsourcing, dynamic searchable symmetric encryption (DSSE) that enables searches and updates over encrypted data has begun to receive growing attention.
Qin Liu   +6 more
semanticscholar   +1 more source

Outsourcing Public Security

Armed Forces & Society, 2013
Since the end of the Cold War, there has been an exponential growth in the use of private military and security companies. Few have debated the long-term consequences outsourcing of security holds for the military profession. The first section of this article outlines the evolution of military outsourcing. From here the focus shifts to how outsourcing
openaire   +1 more source

Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain

IEEE Transactions on Information Forensics and Security
Existing multitask outsourcing computations struggle to guarantee the fairness for participants and the correctness of the computation results. Some solutions use blockchain to address the fairness issue in outsourcing computations.
Lijuan Huo   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy