Results 11 to 20 of about 79,561 (230)

Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT

open access: yesDigital Communications and Networks, 2022
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm for improving the speed of common connected ...
Linjie Wang, Youliang Tian, Jinbo Xiong
doaj   +1 more source

Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme

open access: yesIEEE Access, 2021
Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted.
Zhaohui Tang
doaj   +1 more source

Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption

open access: yesSecur. Commun. Networks, 2021
(e efficiency of fully homomorphic encryption has always affected its practicality. With the dawn of Internet of things, the demand for computation and encryption on resource-constrained devices is increasing.
Mingyang Song   +3 more
semanticscholar   +1 more source

Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme

open access: yes网络与信息安全学报, 2016
In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the ...
Rui SUN, You-Liang TIAN
doaj   +3 more sources

Privacy-preserving trajectory similarity computation method

open access: yesTongxin xuebao, 2022
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU   +4 more
doaj   +2 more sources

Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server

open access: yesIEEE Access, 2020
Modular exponentiation is one of the most fundamental operations in lots of encryption and signature systems. Due to the heavy computation cost of modular exponentiation, many schemes have been put forward to securely outsource modular exponentiation to ...
Dezhi An, Yan Li, Shengcai Zhang, Jun Lu
doaj   +1 more source

A Comprehensive Survey on Secure Outsourced Computation and Its Applications

open access: yesIEEE Access, 2019
With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing.
Yang Yang   +6 more
doaj   +1 more source

The Melbourne Shuffle: Improving Oblivious Storage in the Cloud [PDF]

open access: yes, 2014
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based
B. Pinkas   +6 more
core   +1 more source

Ultra-Fast Homomorphic Encryption Models enable Secure Outsourcing of Genotype Imputation

open access: yesbioRxiv, 2020
Genotype imputation is a fundamental step in genomic data analysis such as GWAS, where missing variant genotypes are predicted using the existing genotypes of nearby ‘tag’ variants.
Miran Kim   +20 more
semanticscholar   +1 more source

Privacy-preserving string search on encrypted genomic data using a generalized suffix tree

open access: yesInformatics in Medicine Unlocked, 2021
Background and objective: Efficient sequencing technologies generate a plethora of genomic data and make it available to researchers. To compute a massive genomic dataset, outsourcing the data to the cloud is often required.
Md Safiur Rahman Mahdi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy