12   Artículos

 
en línea
Saad Said Alqahtany and Toqeer Ali Syed    
In the domain of computer forensics, ensuring the integrity of operations like preservation, acquisition, analysis, and documentation is critical. Discrepancies in these processes can compromise evidence and lead to potential miscarriages of justice. To ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yang Yang and Guanghua Song    
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing... ver más
Revista: Information    Formato: Electrónico

 
en línea
Beibei Song, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu and Chuansheng Wang    
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing th... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mazen Juma, Fuad Alattar and Basim Touqan    
The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected vi... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Yongbo Jiang, Yuan Zhou and Tao Feng    
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yustus Eko Oktian, Elizabeth Nathania Witanto and Sang-Gon Lee    
Since the inception of the Internet of Things (IoT), we have adopted centralized architecture for decades. With the vastly growing number of IoT devices and gateways, this architecture struggles to cope with the high demands of state-of-the-art IoT servi... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Yao Du, Zehua Wang and Victor C. M. Leung    
Blockchain, a distributed ledger technology (DLT), refers to a list of records with consecutive time stamps. This decentralization technology has become a powerful model to establish trust among trustless entities, in a verifiable manner. Motivated by th... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tasos Bakogiannis, Ioannis Mytilinis, Katerina Doka and Georgios Goumas    
Cloud computing offerings traditionally originate from a handful of large and well established providers, which monopolize the market, preventing small players and individuals from having a share. As a result, the few, blindly and perforce trusted entiti... ver más
Revista: Computers    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »