Results 41 to 50 of about 79,561 (230)

Outsourcing home network security [PDF]

open access: yesProceedings of the 2010 ACM SIGCOMM workshop on Home networks, 2010
The growth of home and small enterprise networks brings with it a large number of devices and networks that are either managed poorly or not at all. Hosts on these networks may become compromised and become sources of spam, denial-of-service traffic, or the site of a scam or phishing attack site.
openaire   +1 more source

SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators [PDF]

open access: yes, 2013
Although Cloud Computing promises to lower IT costs and increase users' productivity in everyday life, the unattractive aspect of this new technology is that the user no longer owns all the devices which process personal data.
Eggert, Michael   +9 more
core   +2 more sources

Faster Homomorphic Trace-Type Function Evaluation

open access: yesIEEE Access, 2021
Homomorphic encryption enables computations over encrypted data without decryption, and can be used for outsourcing computations to some untrusted source.
Yu Ishimaki, Hayato Yamana
doaj   +1 more source

Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"

open access: yesIEEE Internet Things J., 2020
Internet-of-Things (IoT) devices have grown in popularity over the past few years. The RSA public-key cryptographic primitive is time consuming for resource-constrained IoT. Recently, Zhang et al.
Damien Vergnaud
semanticscholar   +1 more source

Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing

open access: yesIEEE Access, 2020
Advances in cloud computing have aroused many researchers’ interest in privacy-preserving feature extraction over outsourced multimedia data, especially private image data. Since block truncation coding (BTC) is known as a simple and efficient technology
Mingfang Jiang, Hengfu Yang
semanticscholar   +1 more source

A Framework for Outsourcing of Secure Computation [PDF]

open access: yesProceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is honest.In our setting there is a number of clients C_1,…,Cn with inputs x1,…,xn. The clients want to delegate a secure computation of f(x1,…,xn) to a set of untrusted workers W1,
Thomas P. Jakobsen   +2 more
openaire   +1 more source

Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach [PDF]

open access: yes, 2010
Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for ...
Damiani, Ernesto, Pagano, Francesco
core   +1 more source

E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm

open access: yesIEEE Access, 2018
The sequence comparison of large-scale string-typed data is fundamental in computer science and other computational disciplines. Its development has been promoted into an emerging outsourcing service by the almost unlimited powerful computing and storage
Xiaofei Wang, Yuqing Zhang
doaj   +1 more source

Secure data outsourcing in presence of the inference problem: issues and directions

open access: yesJournal of Information and Telecommunication, 2021
With the emergence of cloud computing paradigms, secure data outsourcing has become one of the crucial challenges which strongly imposes itself. Data owners place their data among cloud service providers in order to increase flexibility, optimize storage,
Adel Jebali   +2 more
doaj   +1 more source

Secure Cloud-Aided Approximate Nearest Neighbor Search on High-Dimensional Data

open access: yesIEEE Access, 2023
As one fundamental data-mining problem, ANN (approximate nearest neighbor search) is widely used in many industries including computer vision, information retrieval, and recommendation system.
Jia Liu   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy