Results 11 to 20 of about 78,996 (280)

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation [PDF]

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2017
This is a copy of the author 's final draft version of an article published in the "Journal of ambient intelligence and humanized computing". The final publication is available at Springer via http://dx.doi.org/10.1007/s12652-017-0658-2In this paper two ...
An Wang, Xu   +4 more
core   +4 more sources

Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation. [PDF]

open access: yesCell Syst, 2021
Kim M   +20 more
europepmc   +2 more sources

Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server

open access: yesIEEE Access, 2020
Modular exponentiation is one of the most fundamental operations in lots of encryption and signature systems. Due to the heavy computation cost of modular exponentiation, many schemes have been put forward to securely outsource modular exponentiation to ...
Dezhi An, Yan Li, Shengcai Zhang, Jun Lu
doaj   +1 more source

A Comprehensive Survey on Secure Outsourced Computation and Its Applications

open access: yesIEEE Access, 2019
With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing.
Yang Yang   +6 more
doaj   +1 more source

The Melbourne Shuffle: Improving Oblivious Storage in the Cloud [PDF]

open access: yes, 2014
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based
B. Pinkas   +6 more
core   +1 more source

Privacy-preserving string search on encrypted genomic data using a generalized suffix tree

open access: yesInformatics in Medicine Unlocked, 2021
Background and objective: Efficient sequencing technologies generate a plethora of genomic data and make it available to researchers. To compute a massive genomic dataset, outsourcing the data to the cloud is often required.
Md Safiur Rahman Mahdi   +3 more
doaj   +1 more source

A secure data outsourcing scheme based on Asmuth – Bloom secret sharing [PDF]

open access: yes, 2015
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service ...
Habbal, Adib   +4 more
core   +1 more source

Secure outsourcing of sequence comparisons [PDF]

open access: yesInternational Journal of Information Security, 2005
Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage, and data. A weak computational device, once connected to such a grid, is no longer limited by its slow speed, small ...
Mikhail J. Atallah, Jiangtao Li
openaire   +1 more source

Outsourcing Managed Security Services [PDF]

open access: yes, 2003
As computer attack patterns shift and threats to networks change and grow almost daily, it is critical that organizations achieve reliable information security. Investment decisions about information security are best considered in the context of managing business risk. Risks can be accepted, mitigated, avoided, or transferred.
Carol Sledge   +4 more
openaire   +2 more sources

Toward Efficient Encrypted Image Retrieval in Cloud Environment

open access: yesIEEE Access, 2019
Outsourcing image search services to public clouds is an ever-increasing trend. However, directly outsourcing image datasets to untrusted clouds introduces privacy concerns. Several secure image retrieval schemes have been proposed recently.
Zhengbai Huang, Meng Zhang, Yi Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy