Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
cloud computation server
arithmetic operations
multi-threading
privacy preserving
storage costs
FHE
bit-wise encoding
bit-wise implementation
bit-wise operation
Homomorphic encryption
function evaluation
lookup table
privacy preserving calculation
single-input function
single-integer input function
time 13.0 min
time 60.0 min
two-input function
Protocols
Scalability
Servers
cloud servers
Cryptography
encrypted data
encryption
data privacy
Table lookup
Cloud Computing
Resiliency
pubcrawl
Metrics
Databases
information retrieval
fully homomorphic encryption
Human Factors
encoding
biblio
Quantum Homomorphic Encryption Based on Quantum Obfuscation
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
open question
telecommunication security
Scalability
Resiliency
Registers
Quantum point function
quantum obfuscation
Quantum mechanics
quantum homomorphic encryption scheme
Quantum homomorphic encryption
quantum computing security
quantum computation
public key cryptography
quantum computing
Metrics
Logic gates
Human Factors
Homomorphic encryption
encryption operator
encryption
encrypting party
encrypted data
decrypting party
data privacy
pubcrawl
security
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
Homomorphic encryption
storage paradigm
Scalability
Resiliency
public-key cryptosystem
pubcrawl
Paillier homomorphic encryption scheme
Paillier homomorphic cryptosystem
paillier cryptosystem
modular multiplicative arithmetic
Metrics
improved decryption process
Human Factors
Algorithm
fast decryption process
fast decryption algorithm
encryption
encrypted data
decryption speed
decryption
data privacy
Cryptography
Computational efficiency
computational cost
Complexity theory
Cathode ray tubes
biblio
A Noise-Free Homomorphic Encryption based on Chaotic System
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
noise-free homomorphic encryption
EMORE algorithm
encryption-decryption time
enhanced matrix operation
FHE
floating-point number
homomorphism property
modular arithmetic operation
Noise Free
noise-free algorithm
EMORE
outsourced data computing
positive randomness properties
reliable cloud computing environment
reliable encryption
research topics
secure Cloud computing environment
secure encryption
symmetric algorithm
Correlation
Scalability
Cryptography
encrypted data
encryption
data privacy
Resiliency
pubcrawl
Metrics
Reliability
Cloud Computing
fully homomorphic encryption
Security analysis
Human Factors
Homomorphic encryption
outsourcing
chaotic system
Sensitivity
Symmetric matrices
biblio
Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
authenticity
privacy preserving data aggregation
mobility awareness
location related awareness
Io
homomorphic encryption algorithms
Cloud Securit
fog node
Homomorphic encryption
cloud environment
Fog computing
Human Factors
cloud services
Cloud Computing
False Data Injection
Metrics
privacy
pubcrawl
Resiliency
data integrity
IoT devices
Internet of Things
data privacy
Cryptography
Scalability
biblio
Differential Privacy Information Publishing Algorithm based on Cluster Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
differential privacy information publishing algorithm
Running efficiency
Resiliency
resilience
Publishing
pubcrawl
privacy budget
pattern clustering
Metrics
internet technology
Internet of Things
internet
information loss
Human behavior
anonymity
differential privacy
data privacy
composability
Complexity theory
complex background knowledge
clustering anonymity
Clustering algorithms
clustering
cluster anonymity
Big Data
background attack
Artificial Intelligence
anonymous
biblio
Data Anonymization: K-anonymity Sensitivity Analysis
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
pubcrawl
Human behavior
k-anonymity
k-anonymity sensitivity analysis
local authorities
Metrics
open government data
personal data privacy
personal data protection
government data processing
resilience
Resiliency
sensitivity analysis
Social Justice
Sociology
Statistics
tools
anonymity
GDPR
further education
European General Data Protection Regulation
education
digitization process
data usability
Data protection
data privacy
data anonymization
data anonimization
composability
central governments
Brazilian higher education evaluation system
ARX k-anonymization
ARX
biblio
Balancing Data Utility versus Information Loss in Data-Privacy Protection using k-Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
machine learning algorithms
Resiliency
resilience
pubcrawl
process control
privacy protection
privacy
Neural networks
Metrics
anonymity
machine learning
k-anonymity
information loss
Human behavior
data utility
data privacy
composability
Classification algorithms
biblio
Investigation on Privacy Preserving using K-Anonymity Techniques
Submitted by grigby1 on Thu, 01/28/2021 - 2:00pm
medical conditions
UML
Resiliency
resilience
Repository
pubcrawl
Privacy-preserving
privacy preserving
Portals
personal information
person-identifiable information
online portals
Metrics
anonymity
k-anonymity techniques
k-anonymity
Human behavior
data repository
data privacy
Data mining
data encryption
Cryptography
credit card information
computing device pervasiveness
composability
component
biblio
Conditional Anonymity enabled Blockchain-based Ad Dissemination in Vehicular Ad-hoc Network
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
resilience
Human behavior
in-vehicle service
internal attacker scenarios
malicious users
message authentication
Metrics
monitoring authority
privacy
pubcrawl
fake ads
Resiliency
vehicle-to-infrastructure communication
vehicle-to-vehicle communication
vehicular ad hoc networks
Vehicular Ad-hoc Network
vehicular network
zero-knowledge proof of knowledge
ZKPoK
certification authority
advertisement sharing
advertising
anonymity
authenticated users
behavioural privacy leakage
blockchain
blockchain-based ad dissemination
certificate-less cryptography
ad dissemination
composability
conditional anonymity
cryptocurrencies
Cryptography
data privacy
delays
Distributed databases
fair incentive mechanism
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »