Results 201 to 210 of about 956 (257)
Power Control in Wireless Body Area Networks: A Review of Mechanisms, Challenges, and Future Directions. [PDF]
Su H, Zhao Z, Gu B, Lin S.
europepmc +1 more source
A systematic review of quantum machine learning for digital health. [PDF]
Gupta RS +4 more
europepmc +1 more source
Formal analysis of signal protocol based on logic of events theory. [PDF]
Li Z, Xiao M, Xu R.
europepmc +1 more source
Health-FedNet: secure federated learning for chronic disease prediction on MIMIC-III with differential privacy and homomorphic encryption. [PDF]
Shahid MI +3 more
europepmc +1 more source
FedHGPrompt: Privacy-Preserving Federated Prompt Learning for Few-Shot Heterogeneous Graph Learning. [PDF]
Wu X, Shi J, Zhang X.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Provably Secure (Broadcast) Homomorphic Signcryption
International Journal of Foundations of Computer Science, 2019Signcryption has drawn a lot of attention due to its useful applications in many areas, in particular for applications where the computation and communication resources are constrained, for example, for lightweight devices. The traditional signcryption scheme does not support the homomorphic property. Recent work by Rezaeibagha et al.
Rezaeibagha, Fatemeh +3 more
openaire +3 more sources
2002
This chapter deals with provable security. It is desirable that mathematical proofs show that a given cryptosystem resists certain types of attacks. The security of cryptographic schemes and randomness are closely related. An encryption method provides secrecy only if the ciphertexts appear sufficiently random to the adversary. Therefore, probabilistic
Hans Delfs, Helmut Knebl
openaire +1 more source
This chapter deals with provable security. It is desirable that mathematical proofs show that a given cryptosystem resists certain types of attacks. The security of cryptographic schemes and randomness are closely related. An encryption method provides secrecy only if the ciphertexts appear sufficiently random to the adversary. Therefore, probabilistic
Hans Delfs, Helmut Knebl
openaire +1 more source
Provably Secure Identity Based Provable Data Possession
2015Provable Data Possession PDP, which enables cloud users to verify the integrity of their outsourced data without retrieving the entire file from cloud servers, is highly essential in secure cloud storage. A majority of the existing PDP schemes rely on the expensive Public Key Infrastructure PKI.
Yu, Yong +4 more
openaire +2 more sources
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Logic locking has been conceived as a promising proactive defense strategy against intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and overbuilding attacks. Yet, various attacks that use a working chip as an oracle have been launched on logic locking to successfully retrieve its secret key, undermining the ...
Muhammad Yasin +5 more
openaire +1 more source
Logic locking has been conceived as a promising proactive defense strategy against intellectual property (IP) piracy, counterfeiting, hardware Trojans, reverse engineering, and overbuilding attacks. Yet, various attacks that use a working chip as an oracle have been launched on logic locking to successfully retrieve its secret key, undermining the ...
Muhammad Yasin +5 more
openaire +1 more source

