Results 21 to 30 of about 78,996 (280)

PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension

open access: yesBMC Medical Genomics, 2017
Background Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research.
Feng Chen   +9 more
doaj   +1 more source

Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]

open access: yes, 2014
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa   +4 more
core   +3 more sources

Secure efficient and verifiable large linear equations solve outsourcing computing scheme

open access: yes网络与信息安全学报, 2017
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj   +3 more sources

Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments [PDF]

open access: yes, 2013
For the past decade, query processing on relational data has been studied extensively, and many theoretical and practical solutions to query processing have been proposed under various scenarios.
Elmehdwi, Yousef   +2 more
core   +3 more sources

Practical Secure Computation Outsourcing [PDF]

open access: yesACM Computing Surveys, 2018
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outsource large-scale computational tasks to a cloud. Nonetheless, the issue of security and privacy becomes
Zihao Shan   +3 more
openaire   +1 more source

Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud

open access: yesIEEE Access, 2016
Cloud computing enables customers with limited computational resources to outsource their huge computation workloads to the cloud with massive computational power.
Lifeng Zhou, Chunguang Li
doaj   +1 more source

Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]

open access: yesJisuanji kexue
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj   +1 more source

Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud

open access: yes, 2018
The increasing massive data generated by various sources has given birth to big data analytics. Solving large-scale nonlinear programming problems (NLPs) is one important big data analytics task that has applications in many domains such as transport and
C Wang   +14 more
core   +1 more source

Fog Computing Over IoT: A Secure Deployment and Formal Verification

open access: yesIEEE Access, 2017
Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on.
Samman Zahra   +6 more
doaj   +1 more source

Encrypt-to-Self: Securely Outsourcing Storage [PDF]

open access: yes, 2020
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage. The setting assumes a memory-bounded computing device that inflates the amount of volatile or permanent memory available to it by letting other (untrusted) devices hold encryptions of information that they return on request.
Jeroen Pijnenburg, Bertram Poettering
openaire   +1 more source

Home - About - Disclaimer - Privacy