Secret Cracking and Security Enhancement for the Image Application of CRT-based Secret Sharing
R Wang, L Li, G Yang, X Yan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The Asmuth and Bloom threshold secret sharing (AB-SS) is a classical introduction of the
Chinese remainder theorem (CRT) to secret sharing, offering low computational complexity …
Chinese remainder theorem (CRT) to secret sharing, offering low computational complexity …
Thompson Sampling and Proportional-Greedy Algorithm for Uncertain Coded Edge Computing
This paper investigates the allocation of coded computing tasks in edge networks with
uncertain conditions. Specifically, it focuses on scenarios where the computing speed …
uncertain conditions. Specifically, it focuses on scenarios where the computing speed …
Coded Distributed Computing over Unreliable and Insecure D2D Networks
With the development of wireless computing devices, extending distributed computing to
wireless networks deserves a closer look. This paper considers distributed computing over …
wireless networks deserves a closer look. This paper considers distributed computing over …
[HTML][HTML] Secure multi-cloud resource allocation with SDN and self-adaptive authentication
AM Alhassan - Ain Shams Engineering Journal, 2024 - Elsevier
The multi-cloud-based resource allocation is based on multiple constraints and multiple
configurations that may vary based on customer requirements and cloud service providers' …
configurations that may vary based on customer requirements and cloud service providers' …
Balancing Straggler Mitigation and Information Protection for Matrix Multiplication in Heterogeneous Multi-Group Networks
H Zhu, L Chen, D Wen, X Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Distributed computing has made it possible to satisfy the demands for large-scale matrix
multiplication. A distributed computing system suffers from both straggler problem and …
multiplication. A distributed computing system suffers from both straggler problem and …
An Unconditionally Secure Encryption Protocol for Cloud Storage
M Moltafet, HR Sadjadpour… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
We provide an encryption protocol for storing highly confidential data of a user on a public
cloud storage. We show that the protocol provides unconditional security. More specifically …
cloud storage. We show that the protocol provides unconditional security. More specifically …
Optimizing AWS Cloud Infrastructure: An Analysis of Cloud-Nuke's Impact on Productivity, Cost Efficiency, and Resource Management
PP Singh, KS Saini - … on Sentiment Analysis and Deep Learning …, 2024 - ieeexplore.ieee.org
The quantitative effect of Cloud-Nuke on resource optimization in Amazon Web Services
(AWS) settings is assessed in this study. Key performance indicators (KPIs) are the main …
(AWS) settings is assessed in this study. Key performance indicators (KPIs) are the main …