19   Artículos

 
en línea
Xingchen Wang and Peng Li    
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed    
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure... ver más
Revista: Information    Formato: Electrónico

 
en línea
Huifeng Fan, Ruwei Huang and Fengting Luo    
Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of sampling... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jestine Paul, Benjamin Hong Meng Tan, Bharadwaj Veeravalli and Khin Mi Mi Aung    
Machine learning classification algorithms, such as decision trees and random forests, are commonly used in many applications. Clients who want to classify their data send them to a server that performs their inference using a trained model. The client m... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Shinji Ono, Jun Takata, Masaharu Kataoka, Tomohiro I, Kilho Shin and Hiroshi Sakamoto    
For the feature selection problem, we propose an efficient privacy-preserving algorithm. Let D, F, and C be data, feature, and class sets, respectively, where the feature value ??(????) x ( F i ) and the class label ??(??) x ( C ) are given for each ??... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Yongbo Jiang, Yuan Zhou and Tao Feng    
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hiroki Okada, Shinsaku Kiyomoto and Carlos Cid    
TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt? 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and Bou... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ivan Chizhov,Alexandra Garazha,Ilya Gerasimov,Maxim Nikolaev     Pág. 11 - 22
Fully homomorphic encryption allows computation to be performed on encrypted data without knowing or learning the decryption key. Therefore this technology can be extremely useful for storing and processing personal data. Due to the great interest in thi... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Johannes Kölsch, Christopher Heinz, Axel Ratzke and Christoph Grimm    
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms. The validation of such systems is a challenge and currently mostly done by prototypes. Th... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
????????? ???????? ?????     Pág. 5 - 14
The subject matter of the study is the encryption of information in cloud data computation and storage. Cloud technologies enable reducing the cost of IT infrastructure significantly and responding to changes in computing needs flexibly. In this case, th... ver más

« Anterior     Página: 1 de 1     Siguiente »