Results 321 to 330 of about 230,478 (367)

Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols. [PDF]

open access: yesSensors (Basel)
Julio YR   +4 more
europepmc   +1 more source

Privacy-preserving framework for genomic computations via multi-key homomorphic encryption. [PDF]

open access: yesBioinformatics
Namazi M   +3 more
europepmc   +1 more source

Encrypted PRNG by Logic Encryption

2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2020
In this paper, the authors consider such an area of information security as logical encryption. Logical encryption is one of the most important methods of hardware protection, which introduces additional key inputs into a given combinational scheme to protect functionality from unauthorized use.
Marina A. Kiryakina   +2 more
openaire   +2 more sources

(Leveled) Fully Homomorphic Encryption without Bootstrapping

ACM Transactions on Computation Theory, 2014
We present a novel approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions. A central conceptual contribution in our work is a new way of constructing leveled, fully homomorphic ...
Zvika Brakerski   +2 more
semanticscholar   +1 more source

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

IEEE Transactions on Information Forensics and Security, 2018
We present a privacy-preserving deep learning system in which many learning participants perform neural network-based deep learning over a combined dataset of all, without revealing the participants’ local data to a central server.
L. T. Phong   +4 more
semanticscholar   +1 more source

Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection

IEEE Transactions on Emerging Topics in Computing, 2021
The fast development of Blockchain technology makes it widely applied in several fields of digital transactions, like e-government affairs and the protection of financial transactions. In this article, we propose a homomorphic encryption-based Blockchain
W. Liang   +5 more
semanticscholar   +1 more source

Data Encryption

2009
The Internet evolved over the years as a means for users to access information and exchange emails. Later, once the bandwidth became available, businesses exploited the Internet’s popularity to reach customers online. In the past few years it has been reported that organizations that store and maintain customers’ private and confidential records were ...
Bhushan Kapoor, Pramod Pandya
openaire   +6 more sources

Encrypting the internet

Proceedings of the ACM SIGCOMM 2010 conference, 2010
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is protected today. The primary reason for this neglect is economic, mainly security protocol speed and cost.
Shay Gueron   +5 more
openaire   +2 more sources

Encryption

2002
Publisher Summary Hiding information is a tricky business. The standard encryption functions such as AES (Advanced Encryption Standard) or RSA (the algorithm developed by Ron Rivest, Adi Shamir, and Len Adlernan at MIT) hide data by making it incomprehensible. They take information and convert it into total randomness or white noise.
openaire   +4 more sources

Encrypted data ordering with functional encryption

2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018
For security and privacy, often the user's data are stored on a cloud storage server in an encrypted form. Such data however, are required to be processed in terms of search queries, aggregation, clustering or classification. For better data analysis, the stored data on the server and a result of the processed data should be in lexicographic order. The
Devesh C. Jinwala, Dhruti Sharma
openaire   +2 more sources

Home - About - Disclaimer - Privacy