Results 51 to 60 of about 1,678 (176)
Attribute-based fully homomorphic encryption scheme over rings
The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted ...
Yong-hui ZHENG +3 more
doaj +2 more sources
A Proposed Fully Homomorphic for Securing Cloud Banking Data at Rest
Fully homomorphic encryption (FHE) reaped the importance and amazement of most researchers and followers in data encryption issues, as programs are allowed to perform arithmetic operations on encrypted data without decrypting it and obtain results ...
Zana Thalage Omar, Fadhil Salman Abed
doaj +1 more source
Overflow-Detectable Floating-Point Fully Homomorphic Encryption
A floating-point fully homomorphic encryption (FPFHE) is proposed, which is based on torus fully homomorphic encryption equipped with programmable bootstrapping.
Seunghwan Lee, Dong-Joon Shin
doaj +1 more source
Secure Signal Processing Using Fully Homomorphic Encryption [PDF]
In a world becoming dependent on cloud computing, multiple and many techniques are needed to meet security and privacy requirements. This study investigates using Fully Homomorphic Encryption (FHE) in the cloud for a set of signal processing algorithms. Using FHE provides a level of security and privacy for cloud computing.
Thomas Shortell, Ali Shokoufandeh
openaire +1 more source
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source
The processing of queries to an encrypted database without its decryption has been actively investigated recently by both cryptographers and database researchers.
Filipp B. Burtyka
doaj +1 more source
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye +8 more
wiley +1 more source
Secure Cloud Computing Using Homomorphic Encryption
The question of cloud security has become more significant with growing popularity of cloud computing. This article is dedicated to fully homomorphic encryption which is one of the most promising methods to reach the necessary level of privacy.
Alexander Olegovich Zhirov +2 more
doaj
Homomorphic Encryption for Confidential Statistical Computation: Feasibility and Challenges
Statistical confidentiality focuses on protecting data to preserve its analytical value while preventing identity exposure, ensuring privacy and security in any system handling sensitive information.
Yesem Kurt Peker, Rahul Raj
doaj +1 more source
Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance
ABSTRACT The rapid expansion of artificial intelligence (AI) in digital platforms used by youth has created significant challenges related to privacy, autonomy, and data protection. While AI‐driven personalization offers enhanced user experiences, it often operates without clear ethical boundaries, leaving young digital users vulnerable to data ...
Austin Shouli +3 more
wiley +1 more source

