Results 81 to 90 of about 196,760 (255)

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Simulation-Based Performance Validation of Homomorphic Encryption Algorithms in the Internet of Things

open access: yesFuture Internet, 2019
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms.
Johannes Kölsch   +3 more
doaj   +1 more source

HOMOMORPHIC ENCRYPTION: CLOUD COMPUTING SECURITY AND OTHER APPLICATIONS (A SURVEY)

open access: yesInformatika, 2016
Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on cipher text and to obtain an encrypted result which matches the result of operations performed on the plain text. The article presents a basic
A. I. Trubei
doaj  

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

open access: yes, 2018
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph   +4 more
core   +1 more source

Achievable CCA2 Relaxation for Homomorphic Encryption

open access: yesJournal of Cryptology
Homomorphic encryption (HE) protects data in-use, but can be computationally expensive. To avoid the costly bootstrapping procedure that refreshes ciphertexts, some works have explored client-aided outsourcing protocols, where the client intermittently ...
Adi Akavia   +3 more
semanticscholar   +1 more source

Encrypted LQG using labeled homomorphic encryption [PDF]

open access: yesProceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019
We consider the problem of implementing a Linear Quadratic Gaussian (LQG) controller on a distributed system, while maintaining the privacy of the measurements, state estimates, control inputs and system model. The component sub-systems and actuator outsource the LQG computation to a cloud controller and encrypt their signals and matrices.
Andreea B. Alexandru, George J. Pappas
openaire   +1 more source

An Integer Fully Homomorphic Encryption Scheme with Shorter Public Key Size [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the problem that the efficiency of the integer Fully Homomorphic Encryption(FHE) scheme is low and the public key is long,Coron’s public key compression technique is used to encryption algorithm with a quadratic form,a partial homomorphic ...
SUN Nigang,ZHU Haoran,CHEN Xuanren
doaj   +1 more source

Enabling Secure Database as a Service using Fully Homomorphic Encryption: Challenges and Opportunities [PDF]

open access: yes, 2013
The database community, at least for the last decade, has been grappling with querying encrypted data, which would enable secure database as a service solutions.
Gunda, Manikanta   +2 more
core  

Partially Homomorphic Encryption

open access: yes, 2021
This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh; Naccache-Stern; Okamoto-Uchiyama; Paillier ...
Koç, Ç.K., Özdemir, F., Özger, Z.Ö.
openaire   +1 more source

Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of artificial intelligence (AI) in digital platforms used by youth has created significant challenges related to privacy, autonomy, and data protection. While AI‐driven personalization offers enhanced user experiences, it often operates without clear ethical boundaries, leaving young digital users vulnerable to data ...
Austin Shouli   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy