Showing 441 - 460 results of 498 for search '"homomorphic encryption"', query time: 0.09s Refine Results
  1. 441

    Medical Imaging Applications of Federated Learning by Sukhveer Singh Sandhu, Hamed Taheri Gorji, Pantea Tavakolian, Kouhyar Tavakolian, Alireza Akhbardeh

    Published 2023-10-01
    “…Additionally, we discuss the security benefits, highlighting two primary forms of privacy-preserving techniques, including homomorphic encryption and differential privacy. Finally, we provide some background information and context regarding where the contributions lie. …”
    Get full text
    Article
  2. 442

    A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques by Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi, Amna Eleyan

    Published 2023-04-01
    “…Other asymmetric encryption schemes have been proposed to provide a cloud homomorphic encryption service, where the researchers focused only on how to ensure the homomorphic property. …”
    Get full text
    Article
  3. 443

    A trusted decision fusion approach for the power internet of things with federated learning by Wenjing Li, Nan Zhang, Zhu Liu, Shiqian Ma, Huaqiang Ke, Jinfa Wang, Ting Chen

    Published 2023-03-01
    “…The proposed framework utilizes a homomorphic encryption-based federated learning approach to protect private data from leakage. …”
    Get full text
    Article
  4. 444

    Oppositional Jellyfish Search Optimizer With Deep Transfer Learning Enabled Secure Content-Based Biomedical Image Retrieval by Ehab Bahaudien Ashary, Sahar Jambi, Rehab B. Ashari, Mahmoud Ragab

    Published 2023-01-01
    “…To accomplish this, the presented ODTL-SCBMIR model initially employs multikey homomorphic encryption (MKHE) with an oppositional jellyfish search optimizer (OJSO) algorithm for security. …”
    Get full text
    Article
  5. 445

    A Password Meter without Password Exposure by Pyung Kim, Younho Lee, Youn-Sik Hong, Taekyoung Kwon

    Published 2021-01-01
    “…Our basic idea is straightforward; to adapt fully homomorphic encryption (FHE) schemes to build such a system but its performance achievement is greatly challenging. …”
    Get full text
    Article
  6. 446

    Secure and Evaluable Clustering Based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit by Jialin Li, Penghao Lu, Xuemin Lin

    Published 2022-01-01
    “…Although tremendous revolution has been made in the emerging cloud computing technologies over digital devices, privacy gradually becomes a big concern in outsourcing computation. Homomorphic encryption has been proposed to facilitate the preservation of data privacy while computational tasks being executed on ciphertext. …”
    Get full text
    Article
  7. 447
  8. 448
  9. 449

    Privacy-preserving user profile matching in social networks by Yi, Xun, Bertino, Elisa, Rao, Fang-Yu, Lam, Kwok-Yan, Nepal, Surya, Bouguettaya, Athman

    Published 2020
    “…Our solution is built on homomorphic encryption and allows a user to find out matching users with the help of multiple servers without revealing to anyone the query and the queried user profiles in clear. …”
    Get full text
    Journal Article
  10. 450

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
    Get full text
    Conference or Workshop Item
  11. 451

    Blockchain-Based Electronic Voting: A Secure and Transparent Solution by Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares, Ivo Pereira

    Published 2023-05-01
    “…Digital signatures, homomorphic encryption (He), zero-knowledge proofs (ZKPs), and the Byzantine fault-tolerant consensus method underpin the system. …”
    Get full text
    Article
  12. 452

    FedOpt: Towards Communication Efficiency and Privacy Preservation in Federated Learning by Muhammad Asad, Ahmed Moustafa, Takayuki Ito

    Published 2020-04-01
    “…In order to implement FedOpt, we design a novel compression algorithm, namely, Sparse Compression Algorithm (SCA) for efficient communication, and then integrate the additively homomorphic encryption with differential privacy to prevent data from being leaked. …”
    Get full text
    Article
  13. 453

    ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services by Bharath K. Samanthula, Divya Karthikeyan, Boxiang Dong, K. Anitha Kumari

    Published 2020-10-01
    “…To address this gap, we propose an efficient and secure solution based on homomorphic encryption properties combined with a novel data aggregation technique. …”
    Get full text
    Article
  14. 454

    Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions by Aiting Yao, Gang Li, Xuejun Li, Frank Jiang, Jia Xu, Xiao Liu

    Published 2023-09-01
    “…Due to the nature of smart city applications, massive IoT data may contain sensitive information; hence, various privacy-preserving methods, such as anonymity, federated learning, and homomorphic encryption, have been utilised over the years. …”
    Get full text
    Article
  15. 455

    Secure secondary utilization system of genomic data using quantum secure cloud by Mikio Fujiwara, Hiroki Hashimoto, Kazuaki Doi, Mamiko Kujiraoka, Yoshimichi Tanizawa, Yusuke Ishida, Masahide Sasaki, Masao Nagasaki

    Published 2022-11-01
    “…However, existing secure secondary use of data, such as multi-party computation or homomorphic encryption, can handle only a limited algorithms and usually requires huge computational resources. …”
    Get full text
    Article
  16. 456

    Privacy Preserving Image Encryption with Optimal Deep Transfer Learning Based Accident Severity Classification Model by Uddagiri Sirisha, Bolem Sai Chandana

    Published 2023-01-01
    “…For accident image encryption, the multi-key homomorphic encryption (<i>MKHE</i>) technique with lion swarm optimization (LSO)-based optimal key generation procedure is involved. …”
    Get full text
    Article
  17. 457

    Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies by Kanwal Janjua, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Carsten Maple, Ikram Ud Din

    Published 2020-07-01
    “…For secure storage and session establishment for logs validation, Paillier Homomorphic Encryption, and SSL with Curve25519 is used respectively. …”
    Get full text
    Article
  18. 458

    VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks by Juli Yin, Linfeng Wei, Zhiquan Liu, Xi Yang, Hongliang Sun, Yudan Cheng, Jianbin Mai

    Published 2023-12-01
    “…Two sub mechanisms use Paillier homomorphic encryption technology to ensure the security of data aggregation. …”
    Get full text
    Article
  19. 459

    Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid by Zichao Song, Tanping Zhou, Weidong Zhong, Dong Chen, Longfei Liu, Xiaoyuan Yang

    Published 2023-01-01
    “…Secondly, we construct a privacy-preserving data aggregation scheme without a trusted third party, by combining paillier homomorphic encryption scheme and a secure key agreement protocol. …”
    Get full text
    Article
  20. 460

    A New Blockchain-Based Authentication Framework for Secure IoT Networks by Ahmad K. Al Hwaitat, Mohammed Amin Almaiah, Aitizaz Ali, Shaha Al-Otaibi, Rima Shishakly, Abdalwali Lutfi, Mahmaod Alrawad

    Published 2023-08-01
    “…Additionally, for the first time, we have integrated homomorphic encryption to encrypt the IoT data at the user’s end and upload it to the cloud. …”
    Get full text
    Article