Results 1 to 10 of about 441,462 (365)

Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning

open access: yesFuture Internet, 2021
Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated ...
H. Fang, Q. Qian
semanticscholar   +1 more source

Survey on Fully Homomorphic Encryption, Theory, and Applications

open access: yesProceedings of the IEEE, 2022
Data privacy concerns are increasing significantly in the context of the Internet of Things, cloud services, edge computing, artificial intelligence applications, and other applications enabled by next-generation networks.
Chiara Marcolla   +5 more
semanticscholar   +1 more source

Database Encryption

open access: yes, 2023
International ...
Anciaux, Nicolas   +2 more
openaire   +3 more sources

A dynamic assembly-induced emissive system for advanced information encryption with time-dependent security

open access: yesNature Communications, 2022
The development of advanced materials for information encryption with time-dependent features is essential to meet the increasing demand on encryption security.
Qianqian Wang   +5 more
semanticscholar   +1 more source

Matrično zasnovan algoritam za skrivanje tekstova i obradu informacija

open access: yesVojnotehnički Glasnik, 2014
Primena diferencijalne geometrije u skrivanju tekstualnih podataka prikazana je u ovom radu. Ta primena predstavlja generalizaciju prethodno predstavljenih metoda. Matrično vrednosne funkcije više promenljivih korišćene su u ovom radu.
Nenad O. Vesić, Dušan J. Simjanović
doaj   +1 more source

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

open access: yesIEEE Access, 2020
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso   +4 more
doaj   +1 more source

Database Encryption [PDF]

open access: yes, 2011
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire   +3 more sources

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

open access: yesInternational Journal of Information Security, 2022
Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems like Chebyshev polynomials can provide additional security when used with ...
Unsub Zia   +6 more
semanticscholar   +1 more source

High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography

open access: yesIEEE Access, 2019
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj   +1 more source

Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing

open access: yesIEEE Access, 2018
Cloud computing and social networks are changing the way of healthcare by providing realtime data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application of mobile healthcare social networks ...
Qinlong Huang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy