Results 51 to 60 of about 24,321 (191)
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source
AbstractIn 1978, Rivest et al. (1978) proposed the concepts of data bank and fully homomorphic encryption. Some individuals and organizations encrypt the original data and store them in the data bank for privacy protection. Data bank is also called data cloud. Therefore, the cloud stores a large amount of original data, which is obviously a huge wealth.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Encrypted data processing with Homomorphic Re-Encryption
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ding, Wenxiu +3 more
openaire +3 more sources
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms.
Johannes Kölsch +3 more
doaj +1 more source
HOMOMORPHIC ENCRYPTION: CLOUD COMPUTING SECURITY AND OTHER APPLICATIONS (A SURVEY)
Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on cipher text and to obtain an encrypted result which matches the result of operations performed on the plain text. The article presents a basic
A. I. Trubei
doaj
Enabling Secure Database as a Service using Fully Homomorphic Encryption: Challenges and Opportunities [PDF]
The database community, at least for the last decade, has been grappling with querying encrypted data, which would enable secure database as a service solutions.
Gunda, Manikanta +2 more
core
Encrypted LQG using labeled homomorphic encryption [PDF]
We consider the problem of implementing a Linear Quadratic Gaussian (LQG) controller on a distributed system, while maintaining the privacy of the measurements, state estimates, control inputs and system model. The component sub-systems and actuator outsource the LQG computation to a cloud controller and encrypt their signals and matrices.
Andreea B. Alexandru, George J. Pappas
openaire +1 more source

