Li et al., 2020 - Google Patents
Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistanceLi et al., 2020
- Document ID
- 6311852897465481819
- Author
- Li H
- Yu J
- Zhang H
- Yang M
- Wang H
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
With the development of Internet of Things (IoT) and 5G, edge computing, as a new computing paradigm, has been widely popularized in academia and industry. Due to the distributed architecture and being close to the user, edge computing can faster respond to …
- 238000000034 method 0 abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/14—Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
- G06F17/141—Discrete Fourier transforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance | |
Panda et al. | A secure mutual authentication protocol for IoT environment | |
Kavitha et al. | An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for IoT health care system | |
Ding et al. | Secure outsourcing of modular exponentiations under single untrusted programme model | |
Kalaria et al. | A Secure Mutual authentication approach to fog computing environment | |
Mullai et al. | Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm Optimization and Particle Swarm Optimization for mobile devices | |
CN111984990A (en) | Matrix multiplication task outsourcing method supporting privacy protection based on edge calculation | |
Fu et al. | Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server | |
Ren et al. | Verifiable outsourcing algorithms for modular exponentiations with improved checkability | |
Lu et al. | Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service | |
Berguig et al. | Anonymous and lightweight secure authentication protocol for mobile Agent system | |
Li et al. | Dsos: a distributed secure outsourcing system for edge computing service in iot | |
Chatterjee et al. | An improved authentication and key agreement protocol for smart healthcare system in the context of internet of things using elliptic curve cryptography | |
Fanfara et al. | Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication | |
Li et al. | Secure outsourcing of large-scale convex optimization problem in internet of things | |
Gao et al. | Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing | |
Xiao et al. | New digital signature algorithm based on ECC and its application in bitcoin and IoT | |
Sundararajan et al. | A comprehensive survey on lightweight asymmetric key cryptographic algorithm for resource constrained devices | |
Hsiao et al. | Elliptic Curve Cryptosystems-based Date-constrained Hierarchical Key Management Scheme in Internet of Things. | |
Erfan et al. | Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode | |
Mujeerulla et al. | Demerits of Elliptic Curve Cryptosystem with Bitcoin Curves Using Lenstra–Lenstra–Lovasz (LLL) Lattice Basis Reduction | |
Zhao et al. | Privacy-preserving outsourcing schemes of modular exponentiations using single untrusted cloud server | |
Zhang et al. | Secure outsourcing algorithms of modular exponentiations in edge computing | |
Khan et al. | Security and Performance Analysis of Elliptic Curve Crypto System using Bitcoin Curves. | |
Jebrane et al. | ILAPU-Q: An Improved Lightweight Authentication Protocol for IoT Based on U-quark Hash Function |