DOSE 发表于 2025-3-25 03:40:16

Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Compu Hence, the service providers in cloud computing cannot be trusted. To protect itself from being cheated on, by the untrusted service provider, the client needs a way to verify the correctness of computations returned by the cloud server, on its own machine. This should have very low computational c

倒转 发表于 2025-3-25 10:34:03

http://reply.papertrans.cn/87/8636/863581/863581_22.png

指派 发表于 2025-3-25 15:27:26

http://reply.papertrans.cn/87/8636/863581/863581_23.png

群居男女 发表于 2025-3-25 18:39:46

Anonymizing Classification Data for Preserving Privacysensitive information that may identify certain individuals breaching their privacy, whereas the classification goal requires to accurately classifying the data. One way to achieve both is to anonymize the dataset that contains the sensitive information of individuals before getting it released for

arabesque 发表于 2025-3-25 20:17:27

http://reply.papertrans.cn/87/8636/863581/863581_25.png

暗讽 发表于 2025-3-26 02:43:34

Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Schemethey provide flexible and practical mechanism for collaborative computing. In this paper, we propose a non-tree based secure group key management scheme based on polynomial construction method. In the proposed scheme, an user is supposed to store only two keys (private shared key and group key). Whe

BRACE 发表于 2025-3-26 04:51:43

http://reply.papertrans.cn/87/8636/863581/863581_27.png

discord 发表于 2025-3-26 11:15:24

http://reply.papertrans.cn/87/8636/863581/863581_28.png

充满装饰 发表于 2025-3-26 15:56:33

Reducing Vulnerability of a Fingerprint Authentication Systemtry to recreate the original fingerprint. Here a system is proposed which prevents the possibility of generating fingerprints from the information in the database. Two different fingerprints are acquired from a person. Then the orientation of ridges is calculated from the first fingerprint and minut

不可侵犯 发表于 2025-3-26 19:16:59

Heart Rate Variability for Biometric Authentication Using Time-Domain Featuresc and prognostic tool. This study is intended towards harnessing the HRV property of heart for authentication purpose. For measuring the RR-Interval for HRV analysis, we used photoplethysmography (PPG) based pulse sensor and in-house designed microcontroller based RR-Interval measurement system. Dat
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Security in Computing and Communications; Third International Jemal H. Abawajy,Sougata Mukherjea,Antonio Ruiz-Ma Conference proceedings 20