Articles with "secure computation" as a keyword



Photo by saadahmad_umn from unsplash

Communication-Efficient Secure Computation of Encrypted Inputs using (k, n) Threshold Secret Sharing

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3278995

Abstract: Advancements in Internet of Things devices allow for the collection and analysis of big data. Moreover, cloud computing has emerged as an ideal platform for big data analysis because it quickly provides computing resources for… read more here.

Keywords: secure computation; inline formula; tex math;
Photo from academic.microsoft.com

Blockchain-Based Secure Computation Offloading in Vehicular Networks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2020.3014229

Abstract: Vehicular ad hoc networks (VANETs) has become an important part of modern intelligent transportation systems (ITS). However, under the influence of malicious mobile vehicles, offloading vehicle tasks to the cloud server is threatened by security… read more here.

Keywords: computation offloading; blockchain based; computation; security ... See more keywords
Photo by charanjeet_dhiman from unsplash

Satisfaction-Maximized Secure Computation Offloading in Multi-Eavesdropper MEC Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Wireless Communications"

DOI: 10.1109/twc.2021.3128247

Abstract: In this paper, we consider a mobile edge computing (MEC)-based secure computation offloading system, and design a practical multi-eavesdropper model including two specific scenarios of non-colluding and colluding eavesdropping. Furthermore, we design a requirement satisfaction… read more here.

Keywords: satisfaction maximized; multi eavesdropper; computation offloading; maximized secure ... See more keywords
Photo by hudsoncrafted from unsplash

Efficient Secure Computation from SM Series Cryptography

Sign Up to like & get
recommendations!
Published in 2023 at "Wireless Communications and Mobile Computing"

DOI: 10.1155/2023/6039034

Abstract: The wireless network suffers from many security problems, and computation in a wireless network environment may fail to preserve privacy as well as correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure… read more here.

Keywords: computation; network; secure; series cryptography ... See more keywords