Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
Advances in cloud computing have greatly motivated data owners to outsource their huge
amount of personal multimedia data and/or computationally expensive tasks onto the cloud …
amount of personal multimedia data and/or computationally expensive tasks onto the cloud …
Secure image LBP feature extraction in cloud-based smart campus
The smart campus can monitor students in real time by analyzing students' images, but a
large number of images bring an unbearable burden to the smart campus. The convenience …
large number of images bring an unbearable burden to the smart campus. The convenience …
Publicly verifiable privacy-preserving aggregation and its application in IoT
With the development of smart devices, the Internet of Things (IoT) has found wide
applications and extended various services of Internet. On intermediate nodes and edge …
applications and extended various services of Internet. On intermediate nodes and edge …
Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization
It is inevitable and evident that outsourcing complicated intensive tasks to public cloud
vendors would be the primary option for resource-constrained clients in order to save cost …
vendors would be the primary option for resource-constrained clients in order to save cost …
A tutorial on secure outsourcing of large-scale computations for big data
Today's society is collecting a massive and exponentially growing amount of data that can
potentially revolutionize scientific and engineering fields, and promote business innovations …
potentially revolutionize scientific and engineering fields, and promote business innovations …
Outsourced biometric identification with privacy
Biometric identification typically scans a large-scale database of biometric records for finding
a close enough match of an individual. This paper investigates how to outsource this …
a close enough match of an individual. This paper investigates how to outsource this …
New publicly verifiable computation for batch matrix multiplication
With the prevalence of cloud computing, the resource constrained clients are trended to
outsource their computation-intensive tasks to the cloud server. Although outsourcing …
outsource their computation-intensive tasks to the cloud server. Although outsourcing …
Efficient secure outsourcing of large-scale sparse linear systems of equations
Solving large-scale sparse linear systems of equations (SLSEs) is one of the most common
and fundamental problems in big data, but it is very challenging for resource-limited users …
and fundamental problems in big data, but it is very challenging for resource-limited users …
A secure and verifiable outsourcing scheme for matrix inverse computation
Matrix inverse computation is one of the most fundamental mathematical problems in large-
scale data analytics and computing. It is often too expensive to be solved in resource …
scale data analytics and computing. It is often too expensive to be solved in resource …