Results 1 to 10 of about 18,824 (142)

Privacy-preserving and verifiable spectral graph analysis in the cloud [PDF]

open access: yesScientific Reports
Resorting to cloud computing for spectral graph analysis on large-scale graph data is becoming increasingly popular. However, given the intrusive and opaque natures of cloud services, privacy, and misbehaving cloud that returns incorrect results have ...
Yuzhao Song
doaj   +2 more sources

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

Verifying verified code

open access: yesInnovations in Systems and Software Engineering, 2021
A recent case study from AWS by Chong et al. proposes an effective methodology for Bounded Model Checking in industry. In this paper, we report on a follow up case study that explores the methodology from the perspective of three research questions: (a) can proof artifacts be used across verification tools; (b) are there bugs in verified code; and (c ...
Siddharth Priya   +5 more
openaire   +2 more sources

Verifiable biology

open access: yesJournal of The Royal Society Interface, 2022
The formalization of biological systems using computational modelling approaches as an alternative to mathematical-based methods has recently received much interest because computational models provide a deeper mechanistic understanding of biological systems.
Savas Konur   +2 more
openaire   +3 more sources

VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme

open access: yesApplied Sciences, 2023
Public key encryption with keyword search (PEKS) allows users to perform keyword searches of ciphertext on untrusted cloud storage servers, protecting data privacy while sharing data. However, it faces several security problems in practical applications.
Yingying Tang   +4 more
doaj   +1 more source

Verified Verifiers for Verifying Elections [PDF]

open access: yesProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
The security and trustworthiness of elections is critical to democracy; alas, securing elections is notoriously hard. Powerful cryptographic techniques for verifying the integrity of electronic voting have been developed and are in increasingly common use. The claimed security guarantees of most of these techniques have been formally proved.
Haines, Thomas Edmund   +2 more
openaire   +2 more sources

Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment

open access: yesCryptography, 2023
While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension ...
Buzhen He, Tao Feng
doaj   +1 more source

Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains

open access: yesEntropy, 2023
Machine learning has become increasingly popular in academic and industrial communities and has been widely implemented in various online applications due to its powerful ability to analyze and use data.
Moxuan Fu   +5 more
doaj   +1 more source

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

open access: yesIEEE Access, 2020
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang   +3 more
doaj   +1 more source

Verifiable Delay Function and Its Blockchain-Related Application: A Survey

open access: yesSensors, 2022
The concept of verifiable delay functions has received attention from researchers since it was first proposed in 2018. The applications of verifiable delay are also widespread in blockchain research, such as: computational timestamping, public random ...
Qiang Wu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy