Journal articles on the topic 'Verifiable computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Verifiable computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Simunic, Silvio, Dalen Bernaca, and Kristijan Lenac. "Verifiable Computing Applications in Blockchain." IEEE Access 9 (2021): 156729–45. http://dx.doi.org/10.1109/access.2021.3129314.
Full textYan, Zheng, Xixun Yu, and Wenxiu Ding. "Context-Aware Verifiable Cloud Computing." IEEE Access 5 (2017): 2211–27. http://dx.doi.org/10.1109/access.2017.2666839.
Full textJeveriya, Anjum Dr Shameem Akhter. "CONTEXT AWARE VERIFIABLE CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 6 (2018): 33–56. https://doi.org/10.5281/zenodo.1336668.
Full textSong, Beibei, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu, and Chuansheng Wang. "Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions." Future Internet 15, no. 4 (2023): 152. http://dx.doi.org/10.3390/fi15040152.
Full textSun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu, and Qianhong Wu. "Confidentiality-Preserving Publicly Verifiable Computation." International Journal of Foundations of Computer Science 28, no. 06 (2017): 799–818. http://dx.doi.org/10.1142/s0129054117400196.
Full textYao, Shuang, and Dawei Zhang. "An Anonymous Verifiable Random Function with Applications in Blockchain." Wireless Communications and Mobile Computing 2022 (April 19, 2022): 1–12. http://dx.doi.org/10.1155/2022/6467866.
Full textZara, Maham, Shuzhen Wang, and Hasan Ul Moin. "Blockchain-Based Verifiable Computation: A Review." Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences 61, no. 2 (2024): 113–28. http://dx.doi.org/10.53560/ppasa(61-2)850.
Full textJiao, Zi, Fucai Zhou, Qiang Wang, and Jintong Sun. "RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing." Sensors 22, no. 11 (2022): 4012. http://dx.doi.org/10.3390/s22114012.
Full textWang, Jianfeng, Xiaofeng Chen, Xinyi Huang, Ilsun You, and Yang Xiang. "Verifiable Auditing for Outsourced Database in Cloud Computing." IEEE Transactions on Computers 64, no. 11 (2015): 3293–303. http://dx.doi.org/10.1109/tc.2015.2401036.
Full textXu, Lingling, and Shaohua Tang. "Verifiable computation with access control in cloud computing." Journal of Supercomputing 69, no. 2 (2013): 528–46. http://dx.doi.org/10.1007/s11227-013-1039-z.
Full textZhang, Kai, Lifei Wei, Xiangxue Li, and Haifeng Qian. "Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing." Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/6128437.
Full textXu, Qingshan, Xiaoqing Tan, and Rui Huang. "Improved Resource State for Verifiable Blind Quantum Computation." Entropy 22, no. 9 (2020): 996. http://dx.doi.org/10.3390/e22090996.
Full textGheorghiu, Alexandru, Elham Kashefi, and Petros Wallden. "Robustness and device independence of verifiable blind quantum computing." New Journal of Physics 17, no. 8 (2015): 083040. http://dx.doi.org/10.1088/1367-2630/17/8/083040.
Full textZhu, Yixiao, Hui Li, Jiangtao Cui, and Yong Ma. "Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing." IEEE Access 7 (2019): 169636–45. http://dx.doi.org/10.1109/access.2019.2955243.
Full textAusekar, Swapnil Ramesh, and Syam Kumar Pasupuleti. "Dynamic Verifiable Outsourced Database with Freshness in Cloud Computing." Procedia Computer Science 143 (2018): 367–77. http://dx.doi.org/10.1016/j.procs.2018.10.408.
Full textSu, Yaping, Jianfeng Wang, Yunling Wang, and Meixia Miao. "Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing." IEEE Access 7 (2019): 141352–62. http://dx.doi.org/10.1109/access.2019.2943971.
Full textEL-YAHYAOUI, Ahmed, and Mohamed Dafir ECH-CHERIF EL KETTANI. "A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security." Technologies 7, no. 1 (2019): 21. http://dx.doi.org/10.3390/technologies7010021.
Full textwu, Junhua, Wenzhen Feng, Guopeng Liang, Tiantian Wang, Guangshun Li, and Yuanwang Zheng. "A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing." Security and Communication Networks 2022 (March 10, 2022): 1–12. http://dx.doi.org/10.1155/2022/4095427.
Full textNedal, M. Mohammed, R. Sultan Laman, A. Hamoud Ahmed, and S. Lomte Santosh. "Verifiable secure computation of linear fractional programming using certificate validation." International Journal of Power Electronics and Drive System (IJPEDS) 11, no. 1 (2020): 284–90. https://doi.org/10.11591/ijpeds.v11.i1.pp284-290.
Full textLi, Cheng, Li Yang, and Jianfeng Ma. "A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model." Wireless Communications and Mobile Computing 2020 (November 17, 2020): 1–16. http://dx.doi.org/10.1155/2020/8825623.
Full textFu, Moxuan, Chuan Zhang, Chenfei Hu, Tong Wu, Jinyang Dong, and Liehuang Zhu. "Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains." Entropy 25, no. 7 (2023): 1058. http://dx.doi.org/10.3390/e25071058.
Full textNiu, Kun, Changgen Peng, Weijie Tan, Zhou Zhou, and Yi Xu. "Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing." Security and Communication Networks 2021 (April 28, 2021): 1–11. http://dx.doi.org/10.1155/2021/6654539.
Full textZhu, Yixiao, Wenjie Ma, Jiangtao Cui, Xiaofang Xia, Yanguo Peng, and Jianting Ning. "PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing." Security and Communication Networks 2021 (May 28, 2021): 1–18. http://dx.doi.org/10.1155/2021/5514137.
Full textRuiting, SHAN, CHEN Xiubo, XU Gang, et al. "Verifiable Multi‐Party Universal Blind Quantum Computing in Distributed Networks." Chinese Journal of Electronics 30, no. 4 (2021): 712–18. http://dx.doi.org/10.1049/cje.2021.05.013.
Full textShen, Jian, Dengzhi Liu, Md Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun, and Aniello Castiglione. "Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing." IEEE Transactions on Emerging Topics in Computing 8, no. 2 (2020): 280–90. http://dx.doi.org/10.1109/tetc.2017.2776402.
Full textPremnath, Sriram N., and Zygmunt J. Haas. "A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems." Procedia Computer Science 34 (2014): 474–83. http://dx.doi.org/10.1016/j.procs.2014.07.033.
Full textWang, Hao, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao, and Minghao Zhao. "Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing." Soft Computing 21, no. 24 (2016): 7325–35. http://dx.doi.org/10.1007/s00500-016-2271-2.
Full textLi, Jianwei, Xiaoming Wang, and Qingqing Gan. "Verifiable Data Search with Fine-Grained Authorization in Edge Computing." Security and Communication Networks 2022 (November 10, 2022): 1–15. http://dx.doi.org/10.1155/2022/4252466.
Full textS, Aswin, Chandru V, Mathan Raj, and K. Ashok Kumar. "Secure Date Storage Using ECC Encryption with Verifiable Data Sharing in Cloud." International Research Journal of Computer Science 11, no. 04 (2024): 230–33. http://dx.doi.org/10.26562/irjcs.2024.v1104.16.
Full textZhang, Tao, Xiongfei Song, Lele Zheng, Yani Han, Kai Zhang, and Qi Li. "Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing." Security and Communication Networks 2021 (January 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6679157.
Full textG, Kulkarni Vaibhav. "Secure Integrity Auditing System for Electronic Patient Health Records using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 1536–38. http://dx.doi.org/10.22214/ijraset.2022.40089.
Full textWang, Jianfeng, Hua Ma, Qiang Tang, et al. "Efficient verifiable fuzzy keyword search over encrypted data in cloud computing." Computer Science and Information Systems 10, no. 2 (2013): 667–84. http://dx.doi.org/10.2298/csis121104028w.
Full textMohammed, Nedal, Laman R. Sultan, and Santosh Lomte. "Privacy preserving outsourcing algorithm for two-point linear boundary value problems." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 2 (2019): 1065. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp1065-1069.
Full textJayalakshmi, Karemallaiah, and Revaiah Prabha. "Verifiable data distribution technique for multiple applicants in a cloud computing ecosystem." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 2 (2024): 1241–49. https://doi.org/10.11591/ijai.v13.i2.pp1241-1249.
Full textChang, Ya-Fen. "Flexible Access Control over Verifiable Cloud Computing Services with Provable Security." Informatica 26, no. 2 (2015): 181–98. http://dx.doi.org/10.15388/informatica.2015.44.
Full textPark, Ki-Woong, Jaesun Han, JaeWoong Chung, and Kyu Ho Park. "THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment." IEEE Transactions on Services Computing 6, no. 3 (2013): 300–313. http://dx.doi.org/10.1109/tsc.2012.1.
Full textZhang, Xiaoyu, Xiaofeng Chen, Jianfeng Wang, Zhihui Zhan, and Jin Li. "Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing." Soft Computing 22, no. 23 (2018): 7719–32. http://dx.doi.org/10.1007/s00500-018-3233-7.
Full textKaremallaiah, Jayalakshmi, and Prabha Revaiah. "Verifiable data distribution technique for multiple applicants in a cloud computing ecosystem." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 2 (2024): 1241. http://dx.doi.org/10.11591/ijai.v13.i2.pp1241-1249.
Full textWu, Hongfeng, and Jingjing Yan. "Outsourcing Computing of Large Matrix Jordan Decomposition." Mathematical Problems in Engineering 2019 (August 19, 2019): 1–7. http://dx.doi.org/10.1155/2019/6410626.
Full textEl-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Full textCao, Laicheng, Wenwen He, Xian Guo, and Tao Feng. "A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment." Mathematical Problems in Engineering 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/9267608.
Full textTang, Yongli, Minglu Jin, Hui Meng, Li Yang, and Chengfu Zheng. "Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme." Entropy 25, no. 5 (2023): 822. http://dx.doi.org/10.3390/e25050822.
Full textLong, Weifeng, Jiwen Zeng, Yaying Wu, Yan Gao, and Hui Zhang. "A Certificateless Verifiable Bilinear Pair-Free Conjunctive Keyword Search Encryption Scheme for IoMT." Electronics 13, no. 8 (2024): 1449. http://dx.doi.org/10.3390/electronics13081449.
Full textDuan, Gangqiang, and Shuai Li. "Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem." Electronics 12, no. 18 (2023): 3965. http://dx.doi.org/10.3390/electronics12183965.
Full textFan, Kai, Junxiong Wang, Xin Wang, Hui Li, and Yintang Yang. "A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing." Sensors 17, no. 7 (2017): 1695. http://dx.doi.org/10.3390/s17071695.
Full textZhou, Kai, M. H. Afifi, and Jian Ren. "ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing." IEEE Transactions on Information Forensics and Security 12, no. 11 (2017): 2518–31. http://dx.doi.org/10.1109/tifs.2017.2710941.
Full textTao, Xiaoling, Kai Nie, and Yunling Wang. "Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing." International Journal of Embedded Systems 11, no. 6 (2019): 707. http://dx.doi.org/10.1504/ijes.2019.10025616.
Full textNie, Kai, Yunling Wang, and Xiaoling Tao. "Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing." International Journal of Embedded Systems 11, no. 6 (2019): 707. http://dx.doi.org/10.1504/ijes.2019.103984.
Full textMao, Jingyu. "Multi-authority attribute encryption scheme based on cloud computing verifiable outsourcing decryption." IET Conference Proceedings 2024, no. 21 (2025): 99–106. https://doi.org/10.1049/icp.2024.4209.
Full textGe, Xinrui, Jia Yu, Chengyu Hu, Hanlin Zhang, and Rong Hao. "Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing." IEEE Access 6 (2018): 45725–39. http://dx.doi.org/10.1109/access.2018.2866031.
Full text