Results 51 to 60 of about 79,561 (230)

Beyond BRIC: offshoring in non-BRIC countries: Egypt – a new growth market: an LSE Outsourcing Unit report January 2009 [PDF]

open access: yes, 2009
This report was commissioned as an independently researched report by Hill & Knowlton, acting for the Information Technology Industry Development Agency (ITIDA) of Egypt.
Griffiths, Catherine   +2 more
core  

Securely Outsourcing Large Scale Eigen Value Problem to Public Cloud

open access: yes, 2016
Cloud computing enables clients with limited computational power to economically outsource their large scale computations to a public cloud with huge computational power.
Aktar, Shamminuj   +2 more
core   +1 more source

Cloud outsourcing secret sharing scheme against covert adversaries

open access: yesTongxin xuebao, 2017
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of ...
En ZHANG   +5 more
doaj   +2 more sources

Outsourcing Large-Scale Quadratic Programming to a Public Cloud

open access: yesIEEE Access, 2015
Cloud computing provides service for resource-constrained customers to perform large-scale scientific computation. However, it also brings some new challenges, which have to be considered in designing outsourcing protocols.
Lifeng Zhou, Chunguang Li
doaj   +1 more source

POMIC: Privacy-Preserving Outsourcing Medical Image Classification Based on Convolutional Neural Network to Cloud

open access: yesApplied Sciences, 2023
In the medical field, with the increasing number of medical images, medical image classification has become a hot spot. The convolutional neural network, a technology that can process more images and extract more accurate features with nonlinear models ...
Qing Yu   +3 more
doaj   +1 more source

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values [PDF]

open access: yes, 2015
Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems.
Butler, Kevin   +3 more
core  

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method

open access: yesIEEE Access, 2019
With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use ...
Shengxia Zhang   +4 more
semanticscholar   +1 more source

On the Security of Offloading Post-Processing for Quantum Key Distribution

open access: yesEntropy, 2023
Quantum key distribution (QKD) has been researched for almost four decades and is currently making its way to commercial applications. However, deployment of the technology at scale is challenging because of the very particular nature of QKD and its ...
Thomas Lorünser   +3 more
doaj   +1 more source

Efficient and fully outsourced privacy-preserving decision tree training and prediction based on homomorphic encryption

open access: yesEgyptian Informatics Journal
Outsourcing machine learning models to cloud servers allows data owners to train and utilize models without investing in dedicated hardware. However, this approach raises significant concerns regarding the proprietary nature of the models and the data ...
Nawal Almutairi
doaj   +1 more source

PP-DDP: a privacy-preserving outsourcing framework for solving the double digest problem

open access: yesBMC Bioinformatics, 2023
Background As one of the fundamental problems in bioinformatics, the double digest problem (DDP) focuses on reordering genetic fragments in a proper sequence. Although many algorithms for dealing with the DDP problem were proposed during the past decades,
Jingwen Suo   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy