全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Huiqi Zhao , Qian Chen , Yinglong Wang ...
来源:[J].EURASIP Journal on Wireless Communications and Networking(IF 0.54), 2018, Vol.2018 (1), pp.1-20Springer
摘要:... Aiming at the encryption scheme of fuzzy keyword search and the verifiable problem of the data returned by medical cloud in the security of medical cloud data, this paper analyzes the encryption of medical data outsourcing system on medical cloud and the security search metho...
作者:João Sá Sousa , Cédric Lefebvre , Zhicong Huang ...
来源:[J].BMC Medical Genomics(IF 3.466), 2017, Vol.10 (2)Springer
摘要:... Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related to privacy and security. This calls for new sophisticated techniques that ensure data protection from untrusted cloud providers and that still enable res...
作者:Jan Henrik Ziegeldorf , Jan Pennekamp , David Hellmanns ...
来源:[J].BMC Medical Genomics(IF 3.466), 2017, Vol.10 (2)Springer
摘要:Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedent...
作者:Yuchen Zhang , Wenrui Dai , Xiaoqian Jiang ...
来源:[J].BMC Medical Informatics and Decision Making(IF 1.603), 2015, Vol.15 (S5)Springer
摘要:...(#br) Methods(#br)We presented a novel framework (FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption) to fully outsource GWAS (i.e., chi-square statistic computation) using homomorphic encryption. The proposed framework enables secure divisions over ...
作者:Qinpeng Wang , Longfei He
来源:[J].International Journal of Environmental Research and Public Health(IF 1.998), 2018, Vol.15 (2)DOAJ
摘要:Reducing carbon emissions, including emission abatement outsourcing at the supply-chain level, is becoming a significant but challenging problem in practice. Confronting this challenge, we therefore break down the practice to focus on a low-carbon supply chain consisting of on...
作者:Feng Chen , Chenghong Wang , Wenrui Dai ...
来源:[J].BMC Medical Genomics(IF 3.466), 2017, Vol.10 (2)Springer
摘要:Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data.
作者:Ting Xue , Yanli Ren , Guorui Feng
来源:[J].IETE Technical Review(IF 0.705), 2018, Vol.35 (sup1), pp.97-105Taylor & Francis
摘要:... Outsourcing computation can greatly reduce the users’ computational cost, but the existing schemes are all based on two servers, which are not feasible in the real cloud environment. In this paper, we first propose a scheme where the PKG outsources the task of private key ...
作者:Mazdeh, Mohammad Mahdavi , Jafari, Mostafa , Akhavan, Peyman ...
来源:[J].South African Journal of Industrial Engineering(IF 0.134), 2016, Vol.27 (2), pp.120-131DOAJ
摘要:This study aims to explore the dynamics of the knowledge supply process for new product development in the automotive industry, and to evaluate the impact of knowledge outsourcing on new product development performance. The model was developed using a literature review and a mul...
作者:Xiaowei Zhu
来源:[J].Annals of Operations Research(IF 1.029), 2017, Vol.257 (1-2), pp.449-467Springer
摘要:Outsourcing has been praised as a cost effective solution for many companies. One of the major potential issues of outsourcing is the poor quality of outsourcing work. In this research, Stackelberg game is used to design an outsourcing contract for a supplier and a buyer to ...
作者:Seungtae Hong , Hyeong-Il Kim , Jae-Woo Chang
来源:[J].World Wide Web(IF 1.196), 2017, Vol.20 (3), pp.467-490Springer
摘要:Recently, researches on key management scheme for user access control in outsourced databases have been actively done. Because outsourced databases require dealing with a lot of users and data resources, an efficient key management scheme for reducing the number of authentication...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×