Results 321 to 330 of about 230,478 (367)
Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols. [PDF]
Julio YR+4 more
europepmc +1 more source
Privacy-preserving framework for genomic computations via multi-key homomorphic encryption. [PDF]
Namazi M+3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Encrypted PRNG by Logic Encryption
2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2020In this paper, the authors consider such an area of information security as logical encryption. Logical encryption is one of the most important methods of hardware protection, which introduces additional key inputs into a given combinational scheme to protect functionality from unauthorized use.
Marina A. Kiryakina+2 more
openaire +2 more sources
(Leveled) Fully Homomorphic Encryption without Bootstrapping
ACM Transactions on Computation Theory, 2014We present a novel approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions. A central conceptual contribution in our work is a new way of constructing leveled, fully homomorphic ...
Zvika Brakerski+2 more
semanticscholar +1 more source
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
IEEE Transactions on Information Forensics and Security, 2018We present a privacy-preserving deep learning system in which many learning participants perform neural network-based deep learning over a combined dataset of all, without revealing the participants’ local data to a central server.
L. T. Phong+4 more
semanticscholar +1 more source
Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection
IEEE Transactions on Emerging Topics in Computing, 2021The fast development of Blockchain technology makes it widely applied in several fields of digital transactions, like e-government affairs and the protection of financial transactions. In this article, we propose a homomorphic encryption-based Blockchain
W. Liang+5 more
semanticscholar +1 more source
2009
The Internet evolved over the years as a means for users to access information and exchange emails. Later, once the bandwidth became available, businesses exploited the Internet’s popularity to reach customers online. In the past few years it has been reported that organizations that store and maintain customers’ private and confidential records were ...
Bhushan Kapoor, Pramod Pandya
openaire +6 more sources
The Internet evolved over the years as a means for users to access information and exchange emails. Later, once the bandwidth became available, businesses exploited the Internet’s popularity to reach customers online. In the past few years it has been reported that organizations that store and maintain customers’ private and confidential records were ...
Bhushan Kapoor, Pramod Pandya
openaire +6 more sources
Proceedings of the ACM SIGCOMM 2010 conference, 2010
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is protected today. The primary reason for this neglect is economic, mainly security protocol speed and cost.
Shay Gueron+5 more
openaire +2 more sources
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is protected today. The primary reason for this neglect is economic, mainly security protocol speed and cost.
Shay Gueron+5 more
openaire +2 more sources
2002
Publisher Summary Hiding information is a tricky business. The standard encryption functions such as AES (Advanced Encryption Standard) or RSA (the algorithm developed by Ron Rivest, Adi Shamir, and Len Adlernan at MIT) hide data by making it incomprehensible. They take information and convert it into total randomness or white noise.
openaire +4 more sources
Publisher Summary Hiding information is a tricky business. The standard encryption functions such as AES (Advanced Encryption Standard) or RSA (the algorithm developed by Ron Rivest, Adi Shamir, and Len Adlernan at MIT) hide data by making it incomprehensible. They take information and convert it into total randomness or white noise.
openaire +4 more sources
Encrypted data ordering with functional encryption
2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018For security and privacy, often the user's data are stored on a cloud storage server in an encrypted form. Such data however, are required to be processed in terms of search queries, aggregation, clustering or classification. For better data analysis, the stored data on the server and a result of the processed data should be in lexicographic order. The
Devesh C. Jinwala, Dhruti Sharma
openaire +2 more sources