Showing 1 - 15 results of 15 for search '"outsourcing computation"', query time: 0.05s Refine Results
  1. 1

    Cloud outsourcing secret sharing scheme against covert adversaries by En ZHANG, Kui GENG, Wei JIN, Yong-jun LI, Yun-qing SUN, Feng-hua LI

    Published 2017-05-01
    Subjects: “…secret sharing;outsourcing computation;covert adversaries;fairness…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Secure outsource computing scheme of modular exponentiation based on single server by Weijie DING

    Published 2018-01-01
    Subjects: “…cloud computing;outsource computing;modular exponentiation…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing by Yinghui ZHANG, Sirui ZHANG, Qiuxia ZHAO, Xiaokun ZHENG, Jin CAO

    Published 2024-02-01
    Subjects: “…Wi-Fi fingerprint;outsourced computing;cloud service;Paillier encryption…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Fine-grained attribute update and outsourcing computing access control scheme in fog computing by Ruizhong DU, Peiwen YAN, Yan LIU

    Published 2021-03-01
    Subjects: “…access control;fog computing;outsourcing computing;attribute update;CP-ABE…”
    Get full text
    Article
  12. 12

    Verifiably private outsourcing scheme for multivariate polynomial evaluation by Yan-li REN, Da-wu GU, Jian-xing CAI, Chun-shui HUANG

    Published 2015-08-01
    Subjects: “…cloud computing;big data;multivariate polynomial;verifiable outsourcing computing;multilinear map…”
    Get full text
    Article
  13. 13
  14. 14

    Data sharing scheme supporting secure outsourced computation in wireless body area network by Wei-wei ZHANG, Yu-zhao ZHANG, Chao HUANG, Ru ZHANG, Yi-xian YANG

    Published 2017-04-01
    Subjects: “…wireless body area network;security sharing;outsourced computation;attribute-based encryption;attribute revocation…”
    Get full text
    Article
  15. 15