[PDF][PDF] Methods for secure cloud processing of big data

YN Seitkulov, SN Boranbayev, GB Ulyukova… - 2021 - pdfs.semanticscholar.org
We study new methods of secure cloud processing of big data when solving applied
computationally-complex problems with secret parameters. This is one of the topical issues …

Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix

X Hu, C Tang - Journal of Cloud computing, 2015 - Springer
Linear algebra plays an important role in computer science, especially in cryptography.
Numerous cryptographic protocols and scientific computations are based on linear algebra …

Improvement and applications of secure outsourcing of scientific computations

J Yu, X Wang, W Gao - Journal of Ambient Intelligence and Humanized …, 2015 - Springer
Methods for solving equations play an important role in scientific computation and
cryptography. Usually, many cryptographic protocols and scientific computation problems …

CASO: Cost-aware secure outsourcing of general computational problems

K Zhou, J Ren - IEEE Transactions on Services Computing, 2018 - ieeexplore.ieee.org
Computation outsourcing is an integral part of cloud computing. It enables end-users to
outsource their computational tasks to the cloud and utilize the shared cloud resources in a …

Outsource-secured calculation of closest pair of points

C Kuruba, K Gilbert, P Sidhaye, G Pareek… - Security in Computing …, 2016 - Springer
Outsourcing data/computation intensive tasks to servers having great computing power and
data analytics skills is gaining popularity. While this outsourcing model, due to its cost …

[PDF][PDF] METHODS FOR THE SECURE USE OF EXTERNAL SERVERS TO SOLVE COMPUTATIONALLY-COMPLEX PROBLEMS WITH SECRET PARAMETERS

BB YERGALIYEVA, YN SEITKULOV… - Journal of Theoretical …, 2022 - jatit.org
In this work, we study methods for the secure use of external insecure computers (servers)
when solving computationally-complex problems with secret parameters. This problem is …

[PDF][PDF] Pathfinding on a specialized vector processor

MM Tatur, YN Seitkulov, NL Verenik… - Proceedings of the …, 2013 - world-comp.org
The article describes the algorithm of the shortest path search in the specific graph structure
of self-developed architecture of semantic processor. A simulation model of the processor …

АНАЛИТИЧЕСКИЙ ОБЗОР И МОДЕЛИРОВАНИЕ КРИПТОГРАФИЧЕСКОЙ СИСТЕМЫ РЕЗЕРВНОГО ХРАНЕНИЯ КОНФИДЕНЦИАЛЬНЫХ ДАННЫХ В …

О Тасмагамбетов, Е Сейткулов… - Вестник …, 2022 - vestnik.alt.edu.kz
Аннотация Данная работа посвящается обзору и моделированию криптографической
системы резервного хранения конфиденциальных данных в защищенных серверах, а …

ТРУДЫ УНИВЕРСИТЕТА

ББ ЕРГАЛИЕВА, ЕН СЕЙТКУЛОВ, НН ТАШАТОВ… - ТРУДЫ - elibrary.ru
Целью исследования является разработка новых методов облачной обработки
матричных уравнений большой размерности, стойких к активным и пассивным атакам …

[引用][C] 可验证安全外包矩阵计算及其应用

胡杏, 裴定一, 唐春明 - 中国科学: 信息科学, 2013