-
441
Medical Imaging Applications of Federated Learning
Published 2023-10-01“…Additionally, we discuss the security benefits, highlighting two primary forms of privacy-preserving techniques, including homomorphic encryption and differential privacy. Finally, we provide some background information and context regarding where the contributions lie. …”
Get full text
Article -
442
A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques
Published 2023-04-01“…Other asymmetric encryption schemes have been proposed to provide a cloud homomorphic encryption service, where the researchers focused only on how to ensure the homomorphic property. …”
Get full text
Article -
443
A trusted decision fusion approach for the power internet of things with federated learning
Published 2023-03-01“…The proposed framework utilizes a homomorphic encryption-based federated learning approach to protect private data from leakage. …”
Get full text
Article -
444
Oppositional Jellyfish Search Optimizer With Deep Transfer Learning Enabled Secure Content-Based Biomedical Image Retrieval
Published 2023-01-01“…To accomplish this, the presented ODTL-SCBMIR model initially employs multikey homomorphic encryption (MKHE) with an oppositional jellyfish search optimizer (OJSO) algorithm for security. …”
Get full text
Article -
445
A Password Meter without Password Exposure
Published 2021-01-01“…Our basic idea is straightforward; to adapt fully homomorphic encryption (FHE) schemes to build such a system but its performance achievement is greatly challenging. …”
Get full text
Article -
446
Secure and Evaluable Clustering Based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit
Published 2022-01-01“…Although tremendous revolution has been made in the emerging cloud computing technologies over digital devices, privacy gradually becomes a big concern in outsourcing computation. Homomorphic encryption has been proposed to facilitate the preservation of data privacy while computational tasks being executed on ciphertext. …”
Get full text
Article -
447
-
448
-
449
Privacy-preserving user profile matching in social networks
Published 2020“…Our solution is built on homomorphic encryption and allows a user to find out matching users with the help of multiple servers without revealing to anyone the query and the queried user profiles in clear. …”
Get full text
Journal Article -
450
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
Get full text
Conference or Workshop Item -
451
Blockchain-Based Electronic Voting: A Secure and Transparent Solution
Published 2023-05-01“…Digital signatures, homomorphic encryption (He), zero-knowledge proofs (ZKPs), and the Byzantine fault-tolerant consensus method underpin the system. …”
Get full text
Article -
452
FedOpt: Towards Communication Efficiency and Privacy Preservation in Federated Learning
Published 2020-04-01“…In order to implement FedOpt, we design a novel compression algorithm, namely, Sparse Compression Algorithm (SCA) for efficient communication, and then integrate the additively homomorphic encryption with differential privacy to prevent data from being leaked. …”
Get full text
Article -
453
ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services
Published 2020-10-01“…To address this gap, we propose an efficient and secure solution based on homomorphic encryption properties combined with a novel data aggregation technique. …”
Get full text
Article -
454
Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions
Published 2023-09-01“…Due to the nature of smart city applications, massive IoT data may contain sensitive information; hence, various privacy-preserving methods, such as anonymity, federated learning, and homomorphic encryption, have been utilised over the years. …”
Get full text
Article -
455
Secure secondary utilization system of genomic data using quantum secure cloud
Published 2022-11-01“…However, existing secure secondary use of data, such as multi-party computation or homomorphic encryption, can handle only a limited algorithms and usually requires huge computational resources. …”
Get full text
Article -
456
Privacy Preserving Image Encryption with Optimal Deep Transfer Learning Based Accident Severity Classification Model
Published 2023-01-01“…For accident image encryption, the multi-key homomorphic encryption (<i>MKHE</i>) technique with lion swarm optimization (LSO)-based optimal key generation procedure is involved. …”
Get full text
Article -
457
Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies
Published 2020-07-01“…For secure storage and session establishment for logs validation, Paillier Homomorphic Encryption, and SSL with Curve25519 is used respectively. …”
Get full text
Article -
458
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
Published 2023-12-01“…Two sub mechanisms use Paillier homomorphic encryption technology to ensure the security of data aggregation. …”
Get full text
Article -
459
Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid
Published 2023-01-01“…Secondly, we construct a privacy-preserving data aggregation scheme without a trusted third party, by combining paillier homomorphic encryption scheme and a secure key agreement protocol. …”
Get full text
Article -
460
A New Blockchain-Based Authentication Framework for Secure IoT Networks
Published 2023-08-01“…Additionally, for the first time, we have integrated homomorphic encryption to encrypt the IoT data at the user’s end and upload it to the cloud. …”
Get full text
Article