Secret Cracking and Security Enhancement for the Image Application of CRT-based Secret Sharing

R Wang, L Li, G Yang, X Yan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The Asmuth and Bloom threshold secret sharing (AB-SS) is a classical introduction of the
Chinese remainder theorem (CRT) to secret sharing, offering low computational complexity …

Thompson Sampling and Proportional-Greedy Algorithm for Uncertain Coded Edge Computing

L Kong, CW Sung, KW Shum - IEEE Transactions on Vehicular …, 2024 - ieeexplore.ieee.org
This paper investigates the allocation of coded computing tasks in edge networks with
uncertain conditions. Specifically, it focuses on scenarios where the computing speed …

Coded Distributed Computing over Unreliable and Insecure D2D Networks

J Chen, CW Sung - IEEE Transactions on Communications, 2023 - ieeexplore.ieee.org
With the development of wireless computing devices, extending distributed computing to
wireless networks deserves a closer look. This paper considers distributed computing over …

[HTML][HTML] Secure multi-cloud resource allocation with SDN and self-adaptive authentication

AM Alhassan - Ain Shams Engineering Journal, 2024 - Elsevier
The multi-cloud-based resource allocation is based on multiple constraints and multiple
configurations that may vary based on customer requirements and cloud service providers' …

Balancing Straggler Mitigation and Information Protection for Matrix Multiplication in Heterogeneous Multi-Group Networks

H Zhu, L Chen, D Wen, X Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Distributed computing has made it possible to satisfy the demands for large-scale matrix
multiplication. A distributed computing system suffers from both straggler problem and …

An Unconditionally Secure Encryption Protocol for Cloud Storage

M Moltafet, HR Sadjadpour… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
We provide an encryption protocol for storing highly confidential data of a user on a public
cloud storage. We show that the protocol provides unconditional security. More specifically …

Optimizing AWS Cloud Infrastructure: An Analysis of Cloud-Nuke's Impact on Productivity, Cost Efficiency, and Resource Management

PP Singh, KS Saini - … on Sentiment Analysis and Deep Learning …, 2024 - ieeexplore.ieee.org
The quantitative effect of Cloud-Nuke on resource optimization in Amazon Web Services
(AWS) settings is assessed in this study. Key performance indicators (KPIs) are the main …