Results 11 to 20 of about 18,923 (241)

Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

open access: yesFuture Internet, 2023
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song   +5 more
doaj   +1 more source

Verified bytecode verifiers

open access: yesTheoretical Computer Science, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Klein, Gerwin, Nipkow, Tobias
openaire   +2 more sources

Verifiable Computing Applications in Blockchain

open access: yesIEEE Access, 2021
From weak clients outsourcing computational tasks to more powerful machines, to distributed blockchain nodes needing to agree on the state of the ledger in the presence of adversarial nodes, there is a growing need to efficiently verify the results of ...
Silvio Simunic   +2 more
doaj   +1 more source

Verifying Controlled Components [PDF]

open access: yes, 2004
Recent work on combining CSP and B has provided ways of describing systems comprised of components described in both B (to express requirements on state) and CSP (to express interactive and controller behaviour). This approach is driven by the desire to exploit existing tool support for both CSP and B, and by the need for compositional proof techniques.
Schneider, Steve A., Treharne, Helen
openaire   +3 more sources

A Certificateless Verifiable Strong Designated Verifier Signature Scheme

open access: yesIEEE Access, 2019
Certificateless strong designated verifier signature schemes have realized the merit of CL-PKC against the traditional strong designated verifier signatures.
Shu Han   +8 more
doaj   +1 more source

SIGNED: Smart cIty diGital twiN vErifiable Data Framework

open access: yesIEEE Access, 2023
Smart city digital twins can provide useful insights by making effective use of multidisciplinary urban data from diverse sources. Whilst these insights provide new information that helps cities in decision making, verifying the authenticity, integrity ...
Zeeshan Pervez   +3 more
doaj   +1 more source

Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [PDF]

open access: yesJisuanji kexue, 2022
The convenience and efficiency of cloud computing have brought great potential for its development.More and more enterprises and individuals obtain real benefits by using various outsourcing services provided by cloud computing.In order to protect the ...
ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng
doaj   +1 more source

The Utility of Pain Scale to Assess Verifiable vs Non-Verifiable Pain in United States Emergency Departments

open access: yesWestern Journal of Emergency Medicine, 2020
Introduction: We sought to examine the utility of self-reported pain scale by comparing emergency department (ED) triage pain scores of self-reported but non-verifiable painful conditions with those of verifiable painful conditions using a large ...
K. Tom Xu   +2 more
doaj   +1 more source

A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security

open access: yesTechnologies, 2019
Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive data.
Ahmed EL-YAHYAOUI   +1 more
doaj   +1 more source

Verifying Robocup Teams [PDF]

open access: yes, 2009
Verification of multi-agent systems is a challenging task due to their dynamic nature, and the complex interactions between agents. An example of such a system is the RoboCup Soccer Simulator, where two teams of eleven independent agents play a game of football against each other.
Benac Earle C.   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy