Artykuły w czasopismach na temat „Secure Outsourced Computation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Secure Outsourced Computation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Olakanmi, Oladayo Olufemi, i Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms". International Journal of Cloud Applications and Computing 9, nr 2 (kwiecień 2019): 79–98. http://dx.doi.org/10.4018/ijcac.2019040105.
Pełny tekst źródłaBlanton, Marina, i Mehrdad Aliasgari. "Secure outsourced computation of iris matching". Journal of Computer Security 20, nr 2-3 (12.06.2012): 259–305. http://dx.doi.org/10.3233/jcs-2012-0447.
Pełny tekst źródłaSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin i Wenmin Li. "Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/413265.
Pełny tekst źródłaShao, Jun, i Guiyi Wei. "Secure Outsourced Computation in Connected Vehicular Cloud Computing". IEEE Network 32, nr 3 (maj 2018): 36–41. http://dx.doi.org/10.1109/mnet.2018.1700345.
Pełny tekst źródłaTreiber, Amos, Andreas Nautsch, Jascha Kolberg, Thomas Schneider i Christoph Busch. "Privacy-preserving PLDA speaker verification using outsourced secure computation". Speech Communication 114 (listopad 2019): 60–71. http://dx.doi.org/10.1016/j.specom.2019.09.004.
Pełny tekst źródłaYang, Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo i Victor Chang. "A Comprehensive Survey on Secure Outsourced Computation and Its Applications". IEEE Access 7 (2019): 159426–65. http://dx.doi.org/10.1109/access.2019.2949782.
Pełny tekst źródłaHong, Jun, Tao Wen, Quan Guo i Zhengwang Ye. "Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud". Mathematical Problems in Engineering 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/8109730.
Pełny tekst źródłaYang, Guangcan, Jiayang Li, Yunhua He, Ke Xiao, Yang Xin, Hongliang Zhu i Chen Li. "A Security-Enhanced Query Result Verification Scheme for Outsourced Data in Location-Based Services". Applied Sciences 12, nr 16 (13.08.2022): 8126. http://dx.doi.org/10.3390/app12168126.
Pełny tekst źródłaZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu i Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud". International Journal of Foundations of Computer Science 28, nr 06 (wrzesień 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Pełny tekst źródłaSong, Mingyang, i Yingpeng Sang. "Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud". Sensors 21, nr 20 (14.10.2021): 6821. http://dx.doi.org/10.3390/s21206821.
Pełny tekst źródłaZong, Haoran, Hai Huang i Shufang Wang. "Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption". IEEE Access 9 (2021): 22651–61. http://dx.doi.org/10.1109/access.2021.3056476.
Pełny tekst źródłaAloufi, Asma, Peizhao Hu, Yongsoo Song i Kristin Lauter. "Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey". ACM Computing Surveys 54, nr 9 (31.12.2022): 1–37. http://dx.doi.org/10.1145/3477139.
Pełny tekst źródłaZou, Ying, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping i Baocang Wang. "Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing". Security and Communication Networks 2020 (9.03.2020): 1–11. http://dx.doi.org/10.1155/2020/1238505.
Pełny tekst źródłaWei, Weiming, Chunming Tang i Yucheng Chen. "Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation". Entropy 24, nr 8 (18.08.2022): 1145. http://dx.doi.org/10.3390/e24081145.
Pełny tekst źródłaSun, Xiaoqiang, Zhiwei Sun, Ting Wang, Jie Feng, Jiakai Wei i Guangwu Hu. "A Privacy-Preserving Reinforcement Learning Approach for Dynamic Treatment Regimes on Health Data". Wireless Communications and Mobile Computing 2021 (23.11.2021): 1–16. http://dx.doi.org/10.1155/2021/8952219.
Pełny tekst źródłaSookhak, Mehdi, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan i Nor Badrul Anuar. "Towards Dynamic Remote Data Auditing in Computational Clouds". Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/269357.
Pełny tekst źródłaFan, Kai, Tingting Liu, Kuan Zhang, Hui Li i Yintang Yang. "A secure and efficient outsourced computation on data sharing scheme for privacy computing". Journal of Parallel and Distributed Computing 135 (styczeń 2020): 169–76. http://dx.doi.org/10.1016/j.jpdc.2019.09.008.
Pełny tekst źródłaWang, Qihua, Huaqun Wang, Yufeng Wang i Rui Guo. "A Distributed Access Control with Outsourced Computation in Fog Computing". Security and Communication Networks 2019 (8.07.2019): 1–10. http://dx.doi.org/10.1155/2019/6782753.
Pełny tekst źródłaWang, Huawei, Ye Li, Yingnan Jiao i Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network". International Journal of Distributed Sensor Networks 15, nr 7 (lipiec 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
Pełny tekst źródłaMasood, Raziqa, Nitin Pandey i Q. P. Rana. "Towards an efficient and secure computation over outsourced encrypted data using distributed hash table". International Journal of Cloud Computing 11, nr 3 (2022): 217. http://dx.doi.org/10.1504/ijcc.2022.124152.
Pełny tekst źródłaPandey, Nitin, Q. P. Rana i Raziqa Masood. "Towards an efficient and secure computation over outsourced encrypted data using distributed hash table". International Journal of Cloud Computing 11, nr 3 (2022): 217. http://dx.doi.org/10.1504/ijcc.2022.10048901.
Pełny tekst źródłaBanu, Dr Sameena, i Bibi Hajra Umm E Hani. "Mobile Finger Print Verification and Automatic Log in Platform Using Blockchain". International Journal for Research in Applied Science and Engineering Technology 10, nr 11 (30.11.2022): 737–41. http://dx.doi.org/10.22214/ijraset.2022.47256.
Pełny tekst źródłaBabenko, Mikhail, Andrei Tchernykh, Bernardo Pulido-Gaytan, Arutyun Avetisyan, Sergio Nesmachnow, Xinheng Wang i Fabrizio Granelli. "Towards the Sign Function Best Approximation for Secure Outsourced Computations and Control". Mathematics 10, nr 12 (10.06.2022): 2006. http://dx.doi.org/10.3390/math10122006.
Pełny tekst źródłaKumar, Dilip, Manoj Kumar i Gaurav Gupta. "An Outsourced Decryption ABE Model using ECC in Internet of Things". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 29, nr 06 (grudzień 2021): 949–64. http://dx.doi.org/10.1142/s0218488521500422.
Pełny tekst źródłaHou, Gaopan, Jianfeng Ma, Jiayi Li i Chen Liang. "Audit Outsourced Data in Internet of Things". Security and Communication Networks 2021 (8.05.2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.
Pełny tekst źródłaYang, Changsong, Yueling Liu i Xiaoling Tao. "Assure deletion supporting dynamic insertion for outsourced data in cloud computing". International Journal of Distributed Sensor Networks 16, nr 9 (wrzesień 2020): 155014772095829. http://dx.doi.org/10.1177/1550147720958294.
Pełny tekst źródłaZhao, Ruoli, Yong Xie, Xingxing Jia, Hongyuan Wang i Neeraj Kumar. "Practical Privacy Preserving-Aided Disease Diagnosis with Multiclass SVM in an Outsourced Environment". Security and Communication Networks 2022 (12.10.2022): 1–17. http://dx.doi.org/10.1155/2022/7751845.
Pełny tekst źródłaDeng, Guoqiang, Min Tang, Yuhao Zhang, Ying Huang i Xuefeng Duan. "Privacy-Preserving Outsourced Artificial Neural Network Training for Secure Image Classification". Applied Sciences 12, nr 24 (14.12.2022): 12873. http://dx.doi.org/10.3390/app122412873.
Pełny tekst źródłaZhao, Shengnan, Xiangfu Song, Han Jiang, Ming Ma, Zhihua Zheng i Qiuliang Xu. "An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications". Security and Communication Networks 2020 (5.12.2020): 1–12. http://dx.doi.org/10.1155/2020/8847487.
Pełny tekst źródłaWu, Yiqi, Fazhi He i Yueting Yang. "A Grid-Based Secure Product Data Exchange for Cloud-Based Collaborative Design". International Journal of Cooperative Information Systems 29, nr 01n02 (marzec 2020): 2040006. http://dx.doi.org/10.1142/s0218843020400067.
Pełny tekst źródłaCao, Fang, Jiayi Sun, Xiangyang Luo, Chuan Qin i Ching-Chun Chang. "Privacy-preserving inpainting for outsourced image". International Journal of Distributed Sensor Networks 17, nr 11 (listopad 2021): 155014772110590. http://dx.doi.org/10.1177/15501477211059092.
Pełny tekst źródłaHyder, M. F., S. Tooba i Waseemullah. "Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack". Engineering, Technology & Applied Science Research 11, nr 4 (21.08.2021): 7321–25. http://dx.doi.org/10.48084/etasr.4220.
Pełny tekst źródłaLi, Jiguo, Fengjie Sha, Yichen Zhang, Xinyi Huang i Jian Shen. "Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length". Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/3596205.
Pełny tekst źródłaChen, Jiannan, Ying Wang, Zhaohui Huang, Conghao Ruan i Chunqiang Hu. "A Decentralized Public Auditing Scheme for Secure Cloud Storage Based on Blockchain". Wireless Communications and Mobile Computing 2022 (14.10.2022): 1–12. http://dx.doi.org/10.1155/2022/3688164.
Pełny tekst źródłaZhou, Fucai, Su Peng, Jian Xu i Zifeng Xu. "Identity-Based Batch Provable Data Possession with Detailed Analyses". International Journal of Foundations of Computer Science 28, nr 06 (wrzesień 2017): 743–60. http://dx.doi.org/10.1142/s0129054117400160.
Pełny tekst źródłaKotte, Bhuvaneswari, i T. Sirisha Madhuri. "Providing Security to Ensure Biometric Identification System in Cloud". Asian Journal of Computer Science and Technology 8, nr 3 (15.11.2019): 1–5. http://dx.doi.org/10.51983/ajcst-2019.8.3.2731.
Pełny tekst źródłaGuo, Rui, Chaoyuan Zhuang, Huixian Shi, Yinghui Zhang i Dong Zheng. "A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing". International Journal of Distributed Sensor Networks 16, nr 2 (luty 2020): 155014772090679. http://dx.doi.org/10.1177/1550147720906796.
Pełny tekst źródłaKim, Hyeong-Jin, Hyunjo Lee, Yong-Ki Kim i Jae-Woo Chang. "Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing". Journal of Supercomputing 78, nr 7 (17.01.2022): 9245–84. http://dx.doi.org/10.1007/s11227-021-04286-2.
Pełny tekst źródłaMa, Haobin, Dehua Zhou, Peng Li i Xiaoming Wang. "EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy". Sensors 23, nr 9 (28.04.2023): 4384. http://dx.doi.org/10.3390/s23094384.
Pełny tekst źródłaPeng, Ningduo, Guangchun Luo, Ke Qin i Aiguo Chen. "Query-Biased Preview over Outsourced and Encrypted Data". Scientific World Journal 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/860621.
Pełny tekst źródłaWang, Jiafan, i Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption". Proceedings on Privacy Enhancing Technologies 2022, nr 1 (20.11.2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.
Pełny tekst źródłaHong, Linjian, Kai Zhang, Junqing Gong i Haifeng Qian. "A Practical and Efficient Blockchain-Assisted Attribute-Based Encryption Scheme for Access Control and Data Sharing". Security and Communication Networks 2022 (30.09.2022): 1–14. http://dx.doi.org/10.1155/2022/4978802.
Pełny tekst źródłaZhou, Xingguang, Jianwei Liu, Zongyang Zhang i Qianhong Wu. "Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System". Security and Communication Networks 2020 (10.02.2020): 1–20. http://dx.doi.org/10.1155/2020/8347213.
Pełny tekst źródłaZhou, Jun, Zhenfu Cao, Zhan Qin, Xiaolei Dong i Kui Ren. "LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs". IEEE Transactions on Information Forensics and Security 15 (2020): 420–34. http://dx.doi.org/10.1109/tifs.2019.2923156.
Pełny tekst źródłaZhen, Yan, Yilan Chui, Puning Zhang i Huan Liu. "Multiauthority Attribute-Based Keyword Search over Cloud-Edge-End Collaboration in IoV". Wireless Communications and Mobile Computing 2022 (31.05.2022): 1–14. http://dx.doi.org/10.1155/2022/3513063.
Pełny tekst źródłaKaushik, Shweta, i Charu Gandhi. "Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing". International Journal of Cloud Applications and Computing 10, nr 1 (styczeń 2020): 64–84. http://dx.doi.org/10.4018/ijcac.2020010105.
Pełny tekst źródłaZhu, Binrui, Willy Susilo, Jing Qin, Fuchun Guo, Zhen Zhao i Jixin Ma. "A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks". Sensors 19, nr 11 (6.06.2019): 2583. http://dx.doi.org/10.3390/s19112583.
Pełny tekst źródłaKulkarni, Amogh Pramod, i Manjunath T. N. "Hybrid Cloud-Based Privacy Preserving Clustering as Service for Enterprise Big Data". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 2s (31.01.2023): 146–56. http://dx.doi.org/10.17762/ijritcc.v11i2s.6037.
Pełny tekst źródłaHussien, Hassan Mansur, Sharifah Md Yasin, Nur Izura Udzir i Mohd Izuan Hafez Ninggal. "Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage". Sensors 21, nr 7 (2.04.2021): 2462. http://dx.doi.org/10.3390/s21072462.
Pełny tekst źródłaZhang, Yinghui, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren i Qinglan Zhao. "Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing". Security and Communication Networks 2018 (6.09.2018): 1–12. http://dx.doi.org/10.1155/2018/9081814.
Pełny tekst źródła