Results 31 to 40 of about 5,467 (189)
To help smartphone users protect their phone, fingerprint‐based authentication systems (e.g., Apple’s Touch ID) have increasingly become popular in smartphones. In web applications, however, fingerprint‐based authentication is still rarely used. One of the most serious concerns is the lack of technology for securely storing fingerprint data used for ...
Taeyun Kim +3 more
wiley +1 more source
SecureBP from Homomorphic Encryption
We present a secure backpropagation neural network training model (SecureBP), which allows a neural network to be trained while retaining the confidentiality of the training data, based on the homomorphic encryption scheme. We make two contributions.
Qinju Liu +6 more
wiley +1 more source
Privacy-Preserving Feature Selection with Fully Homomorphic Encryption
For the feature selection problem, we propose an efficient privacy-preserving algorithm. Let D, F, and C be data, feature, and class sets, respectively, where the feature value x(Fi) and the class label x(C) are given for each x∈D and Fi∈F. For a triple (
Shinji Ono +5 more
doaj +1 more source
Theoretical and Experimental Investigations of a Passively Mode-Locked Nd" Glass Laser [PDF]
The presented theoretical model for a mode-locked Nd-glass laser simultaneously takes into account dynamics of the mode-locking dye, amplification saturation and radiation background.
Kolmeder, Christian, Zinth, Wolfgang
core +1 more source
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search [PDF]
The $k$-Nearest Neighbor Search ($k$-NNS) is the backbone of several cloud-based services such as recommender systems, face recognition, and database search on text and images.
Chen, Hao +5 more
core +1 more source
Multi-Key Homomorphic Encryption Scheme with Multi-Output Programmable Bootstrapping
Multi-key Homomorphic Encryption (MKHE) scheme can homomorphically evaluate ciphertexts encrypted by different keys, which can effectively protect the privacy information of data holders in the joint computing of cloud services.
Lingwu Li, Ruwei Huang
doaj +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source
The functional bootstrap in FHEW/TFHE allows for fast table lookups on ciphertexts and is a powerful tool for privacy-preserving computations. However, the functional bootstrap suffers from two limitations: the negacyclic constraint of the lookup table (
Shihe Ma +4 more
doaj +1 more source
First results of CMS RPC performance at 13 TeV
The muon spectrometer of the CMS (Compact Muon Solenoid) experiment at the Large Hadron Collider (LHC) is equipped with a redundant system made of Resistive Plate Chambers (RPCs) and Drift Tube (DT) chambers in the barrel, RPC and Cathode Strip Chambers (
Pedraza-Morales, M. I. +2 more
core +1 more source
Homomorphic encryption (HE) is considered as one of the most powerful solutions to securely protect clients’ data from malicious users and even severs in the cloud computing. However, though it is known that HE can protect the data in theory, it has not been well utilized because many operations of HE are too slow, especially multiplication.
Baek Kyung Song +4 more
wiley +1 more source

