Results 71 to 80 of about 8,550 (197)
The rapid adoption of smart-home and Internet-of-Things (IoT) devices has intensified the need for privacy-preserving biometric authentication that is both secure and computationally efficient.
Raniyah Wazirali +2 more
doaj +1 more source
This paper presents a comprehensive review of Internet of Things (IoT)‐deep reinforcement learning (DRL) integration for smart building energy management, with an emphasis on addressing renewable energy variability, real‐time decision‐making and interoperability challenges.
Tehseen Mazhar +2 more
wiley +1 more source
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M. +4 more
core +1 more source
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley +1 more source
Satellite image classification is an important and challenging task in the modern technological age. Satellites can capture images of danger-prone areas with very little effort. However, the size and number of satellite images are very high when they are
Abhijit Roy +6 more
doaj +1 more source
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
Fog computing-enhanced Internet of Things (IoT) has recently received considerable attention, as the fog devices deployed at the network edge can not only provide low latency, location awareness but also improve real-time and quality of services in IoT ...
Rongxing Lu +3 more
doaj +1 more source
Federated Learning: An approach with Hybrid Homomorphic Encryption
Federated Learning (FL) is a distributed machine learning approach that promises privacy by keeping the data on the device. However, gradient reconstruction and membership-inference attacks show that model updates still leak information. Fully Homomorphic Encryption (FHE) can address those privacy concerns but it suffers from ciphertext expansion and ...
Correia, Pedro +4 more
openaire +2 more sources
Enhancing Data Security in Distributed Systems Using Homomorphic Encryption and Secure Computation Techniques [PDF]
Distributed systems are now an indispensable part of modern computing, and so too must be their security, with privacy-preserving computations being in high demand.
Parihar Bhawana +5 more
doaj +1 more source
Faster NTRU-based Bootstrapping in less than 4 ms
Bootstrapping is a critical technique in constructing fully homomorphic encryption (FHE), which serves to refresh the noise in FHE ciphertexts, enabling an arbitrary number of homomorphic operations.
Zhihao Li +8 more
doaj +1 more source
Presto: Hardware Acceleration of Ciphers for Hybrid Homomorphic Encryption
Hybrid Homomorphic Encryption (HHE) combines symmetric key and homomorphic encryption to reduce ciphertext expansion crucial in client-server deployments of HE. Special symmetric ciphers, amenable to efficient HE evaluation, have been developed. Their client-side deployment calls for performant and energy-efficient implementation, and in this paper we ...
Jeon, Yeonsoo +2 more
openaire +2 more sources

