Artículos de revistas sobre el tema "Secure Outsourced Computation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secure Outsourced Computation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Olakanmi, Oladayo Olufemi y Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms". International Journal of Cloud Applications and Computing 9, n.º 2 (abril de 2019): 79–98. http://dx.doi.org/10.4018/ijcac.2019040105.
Texto completoBlanton, Marina y Mehrdad Aliasgari. "Secure outsourced computation of iris matching". Journal of Computer Security 20, n.º 2-3 (12 de junio de 2012): 259–305. http://dx.doi.org/10.3233/jcs-2012-0447.
Texto completoSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin y Wenmin Li. "Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/413265.
Texto completoShao, Jun y Guiyi Wei. "Secure Outsourced Computation in Connected Vehicular Cloud Computing". IEEE Network 32, n.º 3 (mayo de 2018): 36–41. http://dx.doi.org/10.1109/mnet.2018.1700345.
Texto completoTreiber, Amos, Andreas Nautsch, Jascha Kolberg, Thomas Schneider y Christoph Busch. "Privacy-preserving PLDA speaker verification using outsourced secure computation". Speech Communication 114 (noviembre de 2019): 60–71. http://dx.doi.org/10.1016/j.specom.2019.09.004.
Texto completoYang, Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo y Victor Chang. "A Comprehensive Survey on Secure Outsourced Computation and Its Applications". IEEE Access 7 (2019): 159426–65. http://dx.doi.org/10.1109/access.2019.2949782.
Texto completoHong, Jun, Tao Wen, Quan Guo y Zhengwang Ye. "Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud". Mathematical Problems in Engineering 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/8109730.
Texto completoYang, Guangcan, Jiayang Li, Yunhua He, Ke Xiao, Yang Xin, Hongliang Zhu y Chen Li. "A Security-Enhanced Query Result Verification Scheme for Outsourced Data in Location-Based Services". Applied Sciences 12, n.º 16 (13 de agosto de 2022): 8126. http://dx.doi.org/10.3390/app12168126.
Texto completoZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu y Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Texto completoSong, Mingyang y Yingpeng Sang. "Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud". Sensors 21, n.º 20 (14 de octubre de 2021): 6821. http://dx.doi.org/10.3390/s21206821.
Texto completoZong, Haoran, Hai Huang y Shufang Wang. "Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption". IEEE Access 9 (2021): 22651–61. http://dx.doi.org/10.1109/access.2021.3056476.
Texto completoAloufi, Asma, Peizhao Hu, Yongsoo Song y Kristin Lauter. "Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey". ACM Computing Surveys 54, n.º 9 (31 de diciembre de 2022): 1–37. http://dx.doi.org/10.1145/3477139.
Texto completoZou, Ying, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping y Baocang Wang. "Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing". Security and Communication Networks 2020 (9 de marzo de 2020): 1–11. http://dx.doi.org/10.1155/2020/1238505.
Texto completoWei, Weiming, Chunming Tang y Yucheng Chen. "Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation". Entropy 24, n.º 8 (18 de agosto de 2022): 1145. http://dx.doi.org/10.3390/e24081145.
Texto completoSun, Xiaoqiang, Zhiwei Sun, Ting Wang, Jie Feng, Jiakai Wei y Guangwu Hu. "A Privacy-Preserving Reinforcement Learning Approach for Dynamic Treatment Regimes on Health Data". Wireless Communications and Mobile Computing 2021 (23 de noviembre de 2021): 1–16. http://dx.doi.org/10.1155/2021/8952219.
Texto completoSookhak, Mehdi, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan y Nor Badrul Anuar. "Towards Dynamic Remote Data Auditing in Computational Clouds". Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/269357.
Texto completoFan, Kai, Tingting Liu, Kuan Zhang, Hui Li y Yintang Yang. "A secure and efficient outsourced computation on data sharing scheme for privacy computing". Journal of Parallel and Distributed Computing 135 (enero de 2020): 169–76. http://dx.doi.org/10.1016/j.jpdc.2019.09.008.
Texto completoWang, Qihua, Huaqun Wang, Yufeng Wang y Rui Guo. "A Distributed Access Control with Outsourced Computation in Fog Computing". Security and Communication Networks 2019 (8 de julio de 2019): 1–10. http://dx.doi.org/10.1155/2019/6782753.
Texto completoWang, Huawei, Ye Li, Yingnan Jiao y Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network". International Journal of Distributed Sensor Networks 15, n.º 7 (julio de 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
Texto completoMasood, Raziqa, Nitin Pandey y Q. P. Rana. "Towards an efficient and secure computation over outsourced encrypted data using distributed hash table". International Journal of Cloud Computing 11, n.º 3 (2022): 217. http://dx.doi.org/10.1504/ijcc.2022.124152.
Texto completoPandey, Nitin, Q. P. Rana y Raziqa Masood. "Towards an efficient and secure computation over outsourced encrypted data using distributed hash table". International Journal of Cloud Computing 11, n.º 3 (2022): 217. http://dx.doi.org/10.1504/ijcc.2022.10048901.
Texto completoBanu, Dr Sameena y Bibi Hajra Umm E Hani. "Mobile Finger Print Verification and Automatic Log in Platform Using Blockchain". International Journal for Research in Applied Science and Engineering Technology 10, n.º 11 (30 de noviembre de 2022): 737–41. http://dx.doi.org/10.22214/ijraset.2022.47256.
Texto completoBabenko, Mikhail, Andrei Tchernykh, Bernardo Pulido-Gaytan, Arutyun Avetisyan, Sergio Nesmachnow, Xinheng Wang y Fabrizio Granelli. "Towards the Sign Function Best Approximation for Secure Outsourced Computations and Control". Mathematics 10, n.º 12 (10 de junio de 2022): 2006. http://dx.doi.org/10.3390/math10122006.
Texto completoKumar, Dilip, Manoj Kumar y Gaurav Gupta. "An Outsourced Decryption ABE Model using ECC in Internet of Things". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 29, n.º 06 (diciembre de 2021): 949–64. http://dx.doi.org/10.1142/s0218488521500422.
Texto completoHou, Gaopan, Jianfeng Ma, Jiayi Li y Chen Liang. "Audit Outsourced Data in Internet of Things". Security and Communication Networks 2021 (8 de mayo de 2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.
Texto completoYang, Changsong, Yueling Liu y Xiaoling Tao. "Assure deletion supporting dynamic insertion for outsourced data in cloud computing". International Journal of Distributed Sensor Networks 16, n.º 9 (septiembre de 2020): 155014772095829. http://dx.doi.org/10.1177/1550147720958294.
Texto completoZhao, Ruoli, Yong Xie, Xingxing Jia, Hongyuan Wang y Neeraj Kumar. "Practical Privacy Preserving-Aided Disease Diagnosis with Multiclass SVM in an Outsourced Environment". Security and Communication Networks 2022 (12 de octubre de 2022): 1–17. http://dx.doi.org/10.1155/2022/7751845.
Texto completoDeng, Guoqiang, Min Tang, Yuhao Zhang, Ying Huang y Xuefeng Duan. "Privacy-Preserving Outsourced Artificial Neural Network Training for Secure Image Classification". Applied Sciences 12, n.º 24 (14 de diciembre de 2022): 12873. http://dx.doi.org/10.3390/app122412873.
Texto completoZhao, Shengnan, Xiangfu Song, Han Jiang, Ming Ma, Zhihua Zheng y Qiuliang Xu. "An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications". Security and Communication Networks 2020 (5 de diciembre de 2020): 1–12. http://dx.doi.org/10.1155/2020/8847487.
Texto completoWu, Yiqi, Fazhi He y Yueting Yang. "A Grid-Based Secure Product Data Exchange for Cloud-Based Collaborative Design". International Journal of Cooperative Information Systems 29, n.º 01n02 (marzo de 2020): 2040006. http://dx.doi.org/10.1142/s0218843020400067.
Texto completoCao, Fang, Jiayi Sun, Xiangyang Luo, Chuan Qin y Ching-Chun Chang. "Privacy-preserving inpainting for outsourced image". International Journal of Distributed Sensor Networks 17, n.º 11 (noviembre de 2021): 155014772110590. http://dx.doi.org/10.1177/15501477211059092.
Texto completoHyder, M. F., S. Tooba y Waseemullah. "Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack". Engineering, Technology & Applied Science Research 11, n.º 4 (21 de agosto de 2021): 7321–25. http://dx.doi.org/10.48084/etasr.4220.
Texto completoLi, Jiguo, Fengjie Sha, Yichen Zhang, Xinyi Huang y Jian Shen. "Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length". Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/3596205.
Texto completoChen, Jiannan, Ying Wang, Zhaohui Huang, Conghao Ruan y Chunqiang Hu. "A Decentralized Public Auditing Scheme for Secure Cloud Storage Based on Blockchain". Wireless Communications and Mobile Computing 2022 (14 de octubre de 2022): 1–12. http://dx.doi.org/10.1155/2022/3688164.
Texto completoZhou, Fucai, Su Peng, Jian Xu y Zifeng Xu. "Identity-Based Batch Provable Data Possession with Detailed Analyses". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 743–60. http://dx.doi.org/10.1142/s0129054117400160.
Texto completoKotte, Bhuvaneswari y T. Sirisha Madhuri. "Providing Security to Ensure Biometric Identification System in Cloud". Asian Journal of Computer Science and Technology 8, n.º 3 (15 de noviembre de 2019): 1–5. http://dx.doi.org/10.51983/ajcst-2019.8.3.2731.
Texto completoGuo, Rui, Chaoyuan Zhuang, Huixian Shi, Yinghui Zhang y Dong Zheng. "A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing". International Journal of Distributed Sensor Networks 16, n.º 2 (febrero de 2020): 155014772090679. http://dx.doi.org/10.1177/1550147720906796.
Texto completoKim, Hyeong-Jin, Hyunjo Lee, Yong-Ki Kim y Jae-Woo Chang. "Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing". Journal of Supercomputing 78, n.º 7 (17 de enero de 2022): 9245–84. http://dx.doi.org/10.1007/s11227-021-04286-2.
Texto completoMa, Haobin, Dehua Zhou, Peng Li y Xiaoming Wang. "EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy". Sensors 23, n.º 9 (28 de abril de 2023): 4384. http://dx.doi.org/10.3390/s23094384.
Texto completoPeng, Ningduo, Guangchun Luo, Ke Qin y Aiguo Chen. "Query-Biased Preview over Outsourced and Encrypted Data". Scientific World Journal 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/860621.
Texto completoWang, Jiafan y Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption". Proceedings on Privacy Enhancing Technologies 2022, n.º 1 (20 de noviembre de 2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.
Texto completoHong, Linjian, Kai Zhang, Junqing Gong y Haifeng Qian. "A Practical and Efficient Blockchain-Assisted Attribute-Based Encryption Scheme for Access Control and Data Sharing". Security and Communication Networks 2022 (30 de septiembre de 2022): 1–14. http://dx.doi.org/10.1155/2022/4978802.
Texto completoZhou, Xingguang, Jianwei Liu, Zongyang Zhang y Qianhong Wu. "Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System". Security and Communication Networks 2020 (10 de febrero de 2020): 1–20. http://dx.doi.org/10.1155/2020/8347213.
Texto completoZhou, Jun, Zhenfu Cao, Zhan Qin, Xiaolei Dong y Kui Ren. "LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs". IEEE Transactions on Information Forensics and Security 15 (2020): 420–34. http://dx.doi.org/10.1109/tifs.2019.2923156.
Texto completoZhen, Yan, Yilan Chui, Puning Zhang y Huan Liu. "Multiauthority Attribute-Based Keyword Search over Cloud-Edge-End Collaboration in IoV". Wireless Communications and Mobile Computing 2022 (31 de mayo de 2022): 1–14. http://dx.doi.org/10.1155/2022/3513063.
Texto completoKaushik, Shweta y Charu Gandhi. "Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing". International Journal of Cloud Applications and Computing 10, n.º 1 (enero de 2020): 64–84. http://dx.doi.org/10.4018/ijcac.2020010105.
Texto completoZhu, Binrui, Willy Susilo, Jing Qin, Fuchun Guo, Zhen Zhao y Jixin Ma. "A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks". Sensors 19, n.º 11 (6 de junio de 2019): 2583. http://dx.doi.org/10.3390/s19112583.
Texto completoKulkarni, Amogh Pramod y Manjunath T. N. "Hybrid Cloud-Based Privacy Preserving Clustering as Service for Enterprise Big Data". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 2s (31 de enero de 2023): 146–56. http://dx.doi.org/10.17762/ijritcc.v11i2s.6037.
Texto completoHussien, Hassan Mansur, Sharifah Md Yasin, Nur Izura Udzir y Mohd Izuan Hafez Ninggal. "Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage". Sensors 21, n.º 7 (2 de abril de 2021): 2462. http://dx.doi.org/10.3390/s21072462.
Texto completoZhang, Yinghui, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren y Qinglan Zhao. "Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing". Security and Communication Networks 2018 (6 de septiembre de 2018): 1–12. http://dx.doi.org/10.1155/2018/9081814.
Texto completo