Journal articles on the topic 'Secure Outsourced Computation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure Outsourced Computation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Olakanmi, Oladayo Olufemi, and Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms." International Journal of Cloud Applications and Computing 9, no. 2 (April 2019): 79–98. http://dx.doi.org/10.4018/ijcac.2019040105.
Full textBlanton, Marina, and Mehrdad Aliasgari. "Secure outsourced computation of iris matching." Journal of Computer Security 20, no. 2-3 (June 12, 2012): 259–305. http://dx.doi.org/10.3233/jcs-2012-0447.
Full textSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin, and Wenmin Li. "Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/413265.
Full textShao, Jun, and Guiyi Wei. "Secure Outsourced Computation in Connected Vehicular Cloud Computing." IEEE Network 32, no. 3 (May 2018): 36–41. http://dx.doi.org/10.1109/mnet.2018.1700345.
Full textTreiber, Amos, Andreas Nautsch, Jascha Kolberg, Thomas Schneider, and Christoph Busch. "Privacy-preserving PLDA speaker verification using outsourced secure computation." Speech Communication 114 (November 2019): 60–71. http://dx.doi.org/10.1016/j.specom.2019.09.004.
Full textYang, Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, and Victor Chang. "A Comprehensive Survey on Secure Outsourced Computation and Its Applications." IEEE Access 7 (2019): 159426–65. http://dx.doi.org/10.1109/access.2019.2949782.
Full textHong, Jun, Tao Wen, Quan Guo, and Zhengwang Ye. "Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud." Mathematical Problems in Engineering 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/8109730.
Full textYang, Guangcan, Jiayang Li, Yunhua He, Ke Xiao, Yang Xin, Hongliang Zhu, and Chen Li. "A Security-Enhanced Query Result Verification Scheme for Outsourced Data in Location-Based Services." Applied Sciences 12, no. 16 (August 13, 2022): 8126. http://dx.doi.org/10.3390/app12168126.
Full textZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu, and Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Full textSong, Mingyang, and Yingpeng Sang. "Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud." Sensors 21, no. 20 (October 14, 2021): 6821. http://dx.doi.org/10.3390/s21206821.
Full textZong, Haoran, Hai Huang, and Shufang Wang. "Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption." IEEE Access 9 (2021): 22651–61. http://dx.doi.org/10.1109/access.2021.3056476.
Full textAloufi, Asma, Peizhao Hu, Yongsoo Song, and Kristin Lauter. "Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey." ACM Computing Surveys 54, no. 9 (December 31, 2022): 1–37. http://dx.doi.org/10.1145/3477139.
Full textZou, Ying, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, and Baocang Wang. "Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing." Security and Communication Networks 2020 (March 9, 2020): 1–11. http://dx.doi.org/10.1155/2020/1238505.
Full textWei, Weiming, Chunming Tang, and Yucheng Chen. "Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation." Entropy 24, no. 8 (August 18, 2022): 1145. http://dx.doi.org/10.3390/e24081145.
Full textSun, Xiaoqiang, Zhiwei Sun, Ting Wang, Jie Feng, Jiakai Wei, and Guangwu Hu. "A Privacy-Preserving Reinforcement Learning Approach for Dynamic Treatment Regimes on Health Data." Wireless Communications and Mobile Computing 2021 (November 23, 2021): 1–16. http://dx.doi.org/10.1155/2021/8952219.
Full textSookhak, Mehdi, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan, and Nor Badrul Anuar. "Towards Dynamic Remote Data Auditing in Computational Clouds." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/269357.
Full textFan, Kai, Tingting Liu, Kuan Zhang, Hui Li, and Yintang Yang. "A secure and efficient outsourced computation on data sharing scheme for privacy computing." Journal of Parallel and Distributed Computing 135 (January 2020): 169–76. http://dx.doi.org/10.1016/j.jpdc.2019.09.008.
Full textWang, Qihua, Huaqun Wang, Yufeng Wang, and Rui Guo. "A Distributed Access Control with Outsourced Computation in Fog Computing." Security and Communication Networks 2019 (July 8, 2019): 1–10. http://dx.doi.org/10.1155/2019/6782753.
Full textWang, Huawei, Ye Li, Yingnan Jiao, and Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network." International Journal of Distributed Sensor Networks 15, no. 7 (July 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
Full textMasood, Raziqa, Nitin Pandey, and Q. P. Rana. "Towards an efficient and secure computation over outsourced encrypted data using distributed hash table." International Journal of Cloud Computing 11, no. 3 (2022): 217. http://dx.doi.org/10.1504/ijcc.2022.124152.
Full textPandey, Nitin, Q. P. Rana, and Raziqa Masood. "Towards an efficient and secure computation over outsourced encrypted data using distributed hash table." International Journal of Cloud Computing 11, no. 3 (2022): 217. http://dx.doi.org/10.1504/ijcc.2022.10048901.
Full textBanu, Dr Sameena, and Bibi Hajra Umm E Hani. "Mobile Finger Print Verification and Automatic Log in Platform Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (November 30, 2022): 737–41. http://dx.doi.org/10.22214/ijraset.2022.47256.
Full textBabenko, Mikhail, Andrei Tchernykh, Bernardo Pulido-Gaytan, Arutyun Avetisyan, Sergio Nesmachnow, Xinheng Wang, and Fabrizio Granelli. "Towards the Sign Function Best Approximation for Secure Outsourced Computations and Control." Mathematics 10, no. 12 (June 10, 2022): 2006. http://dx.doi.org/10.3390/math10122006.
Full textKumar, Dilip, Manoj Kumar, and Gaurav Gupta. "An Outsourced Decryption ABE Model using ECC in Internet of Things." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 29, no. 06 (December 2021): 949–64. http://dx.doi.org/10.1142/s0218488521500422.
Full textHou, Gaopan, Jianfeng Ma, Jiayi Li, and Chen Liang. "Audit Outsourced Data in Internet of Things." Security and Communication Networks 2021 (May 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.
Full textYang, Changsong, Yueling Liu, and Xiaoling Tao. "Assure deletion supporting dynamic insertion for outsourced data in cloud computing." International Journal of Distributed Sensor Networks 16, no. 9 (September 2020): 155014772095829. http://dx.doi.org/10.1177/1550147720958294.
Full textZhao, Ruoli, Yong Xie, Xingxing Jia, Hongyuan Wang, and Neeraj Kumar. "Practical Privacy Preserving-Aided Disease Diagnosis with Multiclass SVM in an Outsourced Environment." Security and Communication Networks 2022 (October 12, 2022): 1–17. http://dx.doi.org/10.1155/2022/7751845.
Full textDeng, Guoqiang, Min Tang, Yuhao Zhang, Ying Huang, and Xuefeng Duan. "Privacy-Preserving Outsourced Artificial Neural Network Training for Secure Image Classification." Applied Sciences 12, no. 24 (December 14, 2022): 12873. http://dx.doi.org/10.3390/app122412873.
Full textZhao, Shengnan, Xiangfu Song, Han Jiang, Ming Ma, Zhihua Zheng, and Qiuliang Xu. "An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications." Security and Communication Networks 2020 (December 5, 2020): 1–12. http://dx.doi.org/10.1155/2020/8847487.
Full textWu, Yiqi, Fazhi He, and Yueting Yang. "A Grid-Based Secure Product Data Exchange for Cloud-Based Collaborative Design." International Journal of Cooperative Information Systems 29, no. 01n02 (March 2020): 2040006. http://dx.doi.org/10.1142/s0218843020400067.
Full textCao, Fang, Jiayi Sun, Xiangyang Luo, Chuan Qin, and Ching-Chun Chang. "Privacy-preserving inpainting for outsourced image." International Journal of Distributed Sensor Networks 17, no. 11 (November 2021): 155014772110590. http://dx.doi.org/10.1177/15501477211059092.
Full textHyder, M. F., S. Tooba, and Waseemullah. "Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack." Engineering, Technology & Applied Science Research 11, no. 4 (August 21, 2021): 7321–25. http://dx.doi.org/10.48084/etasr.4220.
Full textLi, Jiguo, Fengjie Sha, Yichen Zhang, Xinyi Huang, and Jian Shen. "Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/3596205.
Full textChen, Jiannan, Ying Wang, Zhaohui Huang, Conghao Ruan, and Chunqiang Hu. "A Decentralized Public Auditing Scheme for Secure Cloud Storage Based on Blockchain." Wireless Communications and Mobile Computing 2022 (October 14, 2022): 1–12. http://dx.doi.org/10.1155/2022/3688164.
Full textZhou, Fucai, Su Peng, Jian Xu, and Zifeng Xu. "Identity-Based Batch Provable Data Possession with Detailed Analyses." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 743–60. http://dx.doi.org/10.1142/s0129054117400160.
Full textKotte, Bhuvaneswari, and T. Sirisha Madhuri. "Providing Security to Ensure Biometric Identification System in Cloud." Asian Journal of Computer Science and Technology 8, no. 3 (November 15, 2019): 1–5. http://dx.doi.org/10.51983/ajcst-2019.8.3.2731.
Full textGuo, Rui, Chaoyuan Zhuang, Huixian Shi, Yinghui Zhang, and Dong Zheng. "A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090679. http://dx.doi.org/10.1177/1550147720906796.
Full textKim, Hyeong-Jin, Hyunjo Lee, Yong-Ki Kim, and Jae-Woo Chang. "Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing." Journal of Supercomputing 78, no. 7 (January 17, 2022): 9245–84. http://dx.doi.org/10.1007/s11227-021-04286-2.
Full textMa, Haobin, Dehua Zhou, Peng Li, and Xiaoming Wang. "EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy." Sensors 23, no. 9 (April 28, 2023): 4384. http://dx.doi.org/10.3390/s23094384.
Full textPeng, Ningduo, Guangchun Luo, Ke Qin, and Aiguo Chen. "Query-Biased Preview over Outsourced and Encrypted Data." Scientific World Journal 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/860621.
Full textWang, Jiafan, and Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.
Full textHong, Linjian, Kai Zhang, Junqing Gong, and Haifeng Qian. "A Practical and Efficient Blockchain-Assisted Attribute-Based Encryption Scheme for Access Control and Data Sharing." Security and Communication Networks 2022 (September 30, 2022): 1–14. http://dx.doi.org/10.1155/2022/4978802.
Full textZhou, Xingguang, Jianwei Liu, Zongyang Zhang, and Qianhong Wu. "Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System." Security and Communication Networks 2020 (February 10, 2020): 1–20. http://dx.doi.org/10.1155/2020/8347213.
Full textZhou, Jun, Zhenfu Cao, Zhan Qin, Xiaolei Dong, and Kui Ren. "LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs." IEEE Transactions on Information Forensics and Security 15 (2020): 420–34. http://dx.doi.org/10.1109/tifs.2019.2923156.
Full textZhen, Yan, Yilan Chui, Puning Zhang, and Huan Liu. "Multiauthority Attribute-Based Keyword Search over Cloud-Edge-End Collaboration in IoV." Wireless Communications and Mobile Computing 2022 (May 31, 2022): 1–14. http://dx.doi.org/10.1155/2022/3513063.
Full textKaushik, Shweta, and Charu Gandhi. "Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing." International Journal of Cloud Applications and Computing 10, no. 1 (January 2020): 64–84. http://dx.doi.org/10.4018/ijcac.2020010105.
Full textZhu, Binrui, Willy Susilo, Jing Qin, Fuchun Guo, Zhen Zhao, and Jixin Ma. "A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks." Sensors 19, no. 11 (June 6, 2019): 2583. http://dx.doi.org/10.3390/s19112583.
Full textKulkarni, Amogh Pramod, and Manjunath T. N. "Hybrid Cloud-Based Privacy Preserving Clustering as Service for Enterprise Big Data." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 2s (January 31, 2023): 146–56. http://dx.doi.org/10.17762/ijritcc.v11i2s.6037.
Full textHussien, Hassan Mansur, Sharifah Md Yasin, Nur Izura Udzir, and Mohd Izuan Hafez Ninggal. "Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage." Sensors 21, no. 7 (April 2, 2021): 2462. http://dx.doi.org/10.3390/s21072462.
Full textZhang, Yinghui, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren, and Qinglan Zhao. "Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing." Security and Communication Networks 2018 (September 6, 2018): 1–12. http://dx.doi.org/10.1155/2018/9081814.
Full text