Results 11 to 20 of about 18,923 (241)
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song +5 more
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Klein, Gerwin, Nipkow, Tobias
openaire +2 more sources
Verifiable Computing Applications in Blockchain
From weak clients outsourcing computational tasks to more powerful machines, to distributed blockchain nodes needing to agree on the state of the ledger in the presence of adversarial nodes, there is a growing need to efficiently verify the results of ...
Silvio Simunic +2 more
doaj +1 more source
Verifying Controlled Components [PDF]
Recent work on combining CSP and B has provided ways of describing systems comprised of components described in both B (to express requirements on state) and CSP (to express interactive and controller behaviour). This approach is driven by the desire to exploit existing tool support for both CSP and B, and by the need for compositional proof techniques.
Schneider, Steve A., Treharne, Helen
openaire +3 more sources
A Certificateless Verifiable Strong Designated Verifier Signature Scheme
Certificateless strong designated verifier signature schemes have realized the merit of CL-PKC against the traditional strong designated verifier signatures.
Shu Han +8 more
doaj +1 more source
SIGNED: Smart cIty diGital twiN vErifiable Data Framework
Smart city digital twins can provide useful insights by making effective use of multidisciplinary urban data from diverse sources. Whilst these insights provide new information that helps cities in decision making, verifying the authenticity, integrity ...
Zeeshan Pervez +3 more
doaj +1 more source
Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [PDF]
The convenience and efficiency of cloud computing have brought great potential for its development.More and more enterprises and individuals obtain real benefits by using various outsourcing services provided by cloud computing.In order to protect the ...
ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng
doaj +1 more source
Introduction: We sought to examine the utility of self-reported pain scale by comparing emergency department (ED) triage pain scores of self-reported but non-verifiable painful conditions with those of verifiable painful conditions using a large ...
K. Tom Xu +2 more
doaj +1 more source
A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive data.
Ahmed EL-YAHYAOUI +1 more
doaj +1 more source
Verification of multi-agent systems is a challenging task due to their dynamic nature, and the complex interactions between agents. An example of such a system is the RoboCup Soccer Simulator, where two teams of eleven independent agents play a game of football against each other.
Benac Earle C. +3 more
openaire +2 more sources

