Results 101 to 110 of about 196,760 (255)

Chat Application Using Homomorphic Encryption [PDF]

open access: diamond, 2022
Sagarik Behera   +4 more
openalex   +1 more source

The integration of generative artificial intelligence and machine learning in healthcare: Current applications and future directions

open access: yesJournal of Intelligent Medicine, Volume 2, Issue 4, Page 179-192, December 2025.
Abstract Machine learning (ML) and generative artificial intelligence (GAI) in recent years are rapidly revolutionizing the healthcare industry offering improved precision and efficiency of healthcare delivery. The use of these advanced technologies in healthcare such as medical imaging, drug discoveries, predictive analytics, and personalized medicine
Muhammad Umar   +10 more
wiley   +1 more source

Fully Homomorphic Encryption

open access: yesProceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017
In this paper we consider fully homomorphic encryption based on the learning with errors problem. We present the problem as introduced by Oded Regev in 2009 and explain a simple public key cryptosystem based on it. We show how the scheme can be modified to be more suitable for homomorphic operations, and introduce bootstrapping, using the ideas ...
Ahmed El-Yahyaoui   +1 more
openaire   +3 more sources

Privacy-preserving approximate GWAS computation based on homomorphic encryption

open access: yesBMC Medical Genomics, 2020
Background One of three tasks in a secure genome analysis competition called iDASH 2018 was to develop a solution for privacy-preserving GWAS computation based on homomorphic encryption.
Duhyeong Kim   +5 more
doaj   +1 more source

Encrypted statistical machine learning: new privacy preserving methods [PDF]

open access: yes, 2015
We present two new statistical machine learning methods designed to learn on fully homomorphic encrypted (FHE) data. The introduction of FHE schemes following Gentry (2009) opens up the prospect of privacy preserving statistical machine learning analysis
Aslett, Louis J. M.   +2 more
core  

Cloud‐Based GWAS Platform: An Innovative Solution for Efficient Acquisition and Analysis of Genomic Data

open access: yesMed Research, Volume 1, Issue 3, Page 397-411, December 2025.
This graphical abstract illustrates the cloud‐based GWAS platform as a hub that integrates six major multiomics domains: phenomics, neuroscience, proteomics, microbiomics, metabolomics, and nutrigenomics. The platform unifies diverse data types—including clinical phenotypes, neuroimaging, plasma proteomics, microbiome profiles, metabolic biomarkers ...
Xiaohong Ke   +12 more
wiley   +1 more source

A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks

open access: yesSensors, 2020
In vehicular ad hoc networks (VANETs), the security and privacy of vehicle data are core issues. In order to analyze vehicle data, they need to be computed.
Xiaoqiang Sun   +4 more
doaj   +1 more source

Verifiable Rotation of Homomorphic Encryptions [PDF]

open access: yes, 2009
Similar to verifiable shuffling (mixing), we consider the problem of verifiable rotating a given list of homomorphic encryptions. The offset by which the list is rotated (cyclic shift) should remain hidden. Basically, we will present zero-knowledge proofs of knowledge of a rotation offset and re-encryption exponents, which define how the input list is ...
Hoogh, de, S.J.A.   +3 more
openaire   +1 more source

Comparative Proteomic Analysis of Self‐Compatible Turnera Mutants Suggests Glutathione S‐Transferase 8 Is Involved in Overcoming S‐Morph Female Self‐Incompatibility Response

open access: yesPlant Direct, Volume 9, Issue 12, December 2025.
ABSTRACT Distyly is a reproductive system, characterized by the presence of two floral morphs, which promotes outcrossing via physical and biochemical means. In distylous Turnera, the mating type of the S‐morph is determined by two genes: YUC6 (male) and BAHD (female).
Paige M. Henning   +3 more
wiley   +1 more source

Ciphertext Policy Attribute based Homomorphic Encryption (CP-ABHERLWE): a fine-grained access control on outsourced cloud data computation [PDF]

open access: yes, 2016
Recently, homomorphic encryption is becoming one of the holy grail in modern cryptography research and serve as a promising tools to protect outsourced data solutions on cloud service providers.
Azman Samsudin, Tan, Soo Fun
core  

Home - About - Disclaimer - Privacy