Articles with "outsourced computation" as a keyword



Secure Outsourced Computation in Connected Vehicular Cloud Computing

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Network"

DOI: 10.1109/mnet.2018.1700345

Abstract: CVCC, a hybrid technology to exploit the computing resources among the cloud, roadside infrastructure, and vehicles, has received considerable attention in recent years. Different from traditional cloud computing, CVCC additionally makes use of underutilized vehicular… read more here.

Keywords: cloud computing; cvcc; outsourced computation; secure outsourced ... See more keywords
Photo by radowanrehan from unsplash

Incentivized Outsourced Computation Resistant to Malicious Contractors

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2015.2499738

Abstract: With the rise of Internet computing, outsourcing difficult computational tasks became an important need. Yet, once the computation is outsourced, the job owner loses control, and hence it is crucial to provide guarantees against malicious… read more here.

Keywords: computation; computation resistant; outsourced computation; job ... See more keywords

Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2018.2861699

Abstract: A Privacy-preserving Verifiable (outsourced) Computation (PVC) protocol enables a resource-constrained client to outsource expensive and sensitive workloads to computationally powerful but possibly untrusted service providers (called workers) and to verify the correctness of the results.… read more here.

Keywords: non interactive; outsourced computation; verifiable outsourced; computation ... See more keywords