Results 81 to 90 of about 78,996 (280)

Secure Outsourced Calculations with Homomorphic Encryption

open access: yesAdvanced Computing: An International Journal, 2018
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to securely process or analyze these
Wang, Qi, Zhou, Dehua, Li, Yanling
openaire   +2 more sources

Green Innovation and Firm Efficiency: The Role of Institutional Quality in Italian High‐Tech Manufacturing Sectors

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino   +2 more
wiley   +1 more source

Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Secure report is the problem of a client that retrieves all records matching specified attributes from a database table at the server (e.g. cloud), as in SQL SELECT queries, but where the query and the database are encrypted.
Adi Akavia, Dan Feldman, Hayim Shaul
doaj   +1 more source

Privacy Preserving Data Mining by Using Implicit Function Theorem

open access: yes, 2013
Data mining has made broad significant multidisciplinary field used in vast application domains and extracts knowledge by identifying structural relationship among the objects in large data bases.
Narsimha, Gugulothu, Rajesh, Pasupuleti
core   +1 more source

Rising Strong: Cultivating Resilience in Edible City Entrepreneurship. Insights Into the Landscape of Urban Food Initiatives

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT In response to growing global challenges, this study explores how social entrepreneurship within the Edible City movement contributes to building resilient, sustainable, and equitable urban food systems. Drawing on semistructured interviews with over 70 stakeholders across five cities—Berlin, Andernach, Oslo, Rotterdam, and Havana—we ...
Ina Säumel   +6 more
wiley   +1 more source

Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture

open access: yesTongxin xuebao, 2023
To solve the problems of data disclosure, uncontrolled data access, and inefficiency of cross-domain data sharing in the Internet of vehicles (IoV), an efficient and secure cross-domain data sharing scheme of IoV under blockchain architecture was ...
Xuejiao LIU, Tiancong CAO, Yingjie XIA
doaj   +2 more sources

A tutorial on secure outsourcing of large-scale computations for big data

open access: yesIEEE Access, 2016
Today's society is collecting a massive and exponentially growing amount of data that can potentially revolutionize scientific and engineering fields, and promote business innovations.
Sergio Salinas   +3 more
doaj   +1 more source

Digital Technologies for Transparent and Sustainable Supply Chain Management: A Resource Orchestration‐Based View in the Textile Industry

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Implementing digital technologies is touted as the next big step for the firms aiming to improve sustainability in their supply chains. These technologies are often credited with the potential to improve transparency and achieve sustainability.
Amna Farrukh, Aqeel Ahmed, Sadaat Yawar
wiley   +1 more source

Complex Firms, Controversial Outcomes: Global Evidence on ESG Failures and Remedies

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT We examine whether business complexity increases firms' exposure to negative environmental, social, and governance (ESG) outcomes, specifically ESG controversies, using a global panel of firms from 37 countries over the period 2002–2021.
Abongeh A. Tunyi   +3 more
wiley   +1 more source

PPTIF: Privacy-Preserving Transformer Inference Framework for Language Translation

open access: yesIEEE Access
The Transformer model has emerged as a prominent machine learning tool within the field of natural language processing. Nevertheless, running the Transformer model on resource-constrained devices presents a notable challenge that needs to be addressed ...
Yanxin Liu, Qianqian Su
doaj   +1 more source

Home - About - Disclaimer - Privacy