Results 81 to 90 of about 15,179 (189)
Secure Signal Processing Using Fully Homomorphic Encryption [PDF]
In a world becoming dependent on cloud computing, multiple and many techniques are needed to meet security and privacy requirements. This study investigates using Fully Homomorphic Encryption (FHE) in the cloud for a set of signal processing algorithms. Using FHE provides a level of security and privacy for cloud computing.
Thomas Shortell, Ali Shokoufandeh
openaire +1 more source
The processing of queries to an encrypted database without its decryption has been actively investigated recently by both cryptographers and database researchers.
Filipp B. Burtyka
doaj +1 more source
SUMMARY Self‐incompatibility (SI) is the single most important mechanism utilized by flowering plants to avoid self‐fertilization, thus preventing inbreeding and promoting outcrossing. Many plant SI systems are genetically controlled by a multi‐allelic S‐locus, containing two tightly linked genes that encode the female and male S‐determinants.
Zongcheng Lin +2 more
wiley +1 more source
Secure Cloud Computing Using Homomorphic Encryption
The question of cloud security has become more significant with growing popularity of cloud computing. This article is dedicated to fully homomorphic encryption which is one of the most promising methods to reach the necessary level of privacy.
Alexander Olegovich Zhirov +2 more
doaj
Homomorphic Encryption for Confidential Statistical Computation: Feasibility and Challenges
Statistical confidentiality focuses on protecting data to preserve its analytical value while preventing identity exposure, ensuring privacy and security in any system handling sensitive information.
Yesem Kurt Peker, Rahul Raj
doaj +1 more source
A Proposed Fully Homomorphic for Securing Cloud Banking Data at Rest
Fully homomorphic encryption (FHE) reaped the importance and amazement of most researchers and followers in data encryption issues, as programs are allowed to perform arithmetic operations on encrypted data without decrypting it and obtain results ...
Zana Thalage Omar, Fadhil Salman Abed
doaj +1 more source
This paper presents an integrated AI‐driven cardiovascular platform unifying multimodal data, predictive analytics, and real‐time monitoring. It demonstrates how artificial intelligence—from deep learning to federated learning—enables early diagnosis, precision treatment, and personalized rehabilitation across the full disease lifecycle, promoting a ...
Mowei Kong +4 more
wiley +1 more source
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms.
Johannes Kölsch +3 more
doaj +1 more source
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source
Multi-Functional Homomorphic Encryption Method Based on Crowd Sensing Networks
In response to the security and privacy issues associated with sensing devices in contemporary crowd sensing systems, the paper proposes a crowd sensing networks method based on the MFHE (the Multi-Functional Homomorphic Encryption) architecture.
Hui Chen +10 more
doaj +1 more source

