|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure...
ver más
|
|
|
|
|
|
|
Mikhail Babenko, Elena Golimblevskaia, Andrei Tchernykh, Egor Shiriaev, Tatiana Ermakova, Luis Bernardo Pulido-Gaytan, Georgii Valuev, Arutyun Avetisyan and Lana A. Gagloeva
Homomorphic encryption (HE) is a promising solution for handling sensitive data in semi-trusted third-party computing environments, as it enables processing of encrypted data. However, applying sophisticated techniques such as machine learning, statistic...
ver más
|
|
|
|
|
|
|
Rezak Aziz, Soumya Banerjee, Samia Bouzefrane and Thinh Le Vinh
The trend of the next generation of the internet has already been scrutinized by top analytics enterprises. According to Gartner investigations, it is predicted that, by 2024, 75% of the global population will have their personal data covered under priva...
ver más
|
|
|
|
|
|
|
Beibei Song, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu and Chuansheng Wang
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing th...
ver más
|
|
|
|
|
|
|
Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo, Yang-Wai Chow and The Anh Ta
Homomorphic encryption (HE) has emerged as a pivotal technology for secure neural network inference (SNNI), offering privacy-preserving computations on encrypted data. Despite active developments in this field, HE-based SNNI frameworks are impeded by thr...
ver más
|
|
|
|
|
|
|
Yi-Wei Wang and Ja-Ling Wu
This work presents an efficient and effective system allowing hospitals to share patients? private information while ensuring that each hospital database?s medical records will not be leaked; moreover, the privacy of patients who access the data will als...
ver más
|
|
|
|
|
|
|
Huifeng Fan, Ruwei Huang and Fengting Luo
Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of sampling...
ver más
|
|
|
|
|
|
|
Konstantinos Demertzis, Konstantinos Rantos, Lykourgos Magafas, Charalabos Skianis and Lazaros Iliadis
Pursuing ?intelligent justice? necessitates an impartial, productive, and technologically driven methodology for judicial determinations. This scholarly composition proposes a framework that harnesses Artificial Intelligence (AI) innovations such as Natu...
ver más
|
|
|
|
|
|
|
Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan and Mohammed Al-Khalidi
In today?s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time c...
ver más
|
|
|
|