Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Homomorphic encryption
biblio
Quantum Homomorphic Encryption Based on Quantum Obfuscation
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
open question
telecommunication security
Scalability
Resiliency
Registers
Quantum point function
quantum obfuscation
Quantum mechanics
quantum homomorphic encryption scheme
Quantum homomorphic encryption
quantum computing security
quantum computation
public key cryptography
quantum computing
Metrics
Logic gates
Human Factors
Homomorphic encryption
encryption operator
encryption
encrypting party
encrypted data
decrypting party
data privacy
pubcrawl
security
biblio
Application of Homomorphic Encryption in Machine Learning
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
Scalability
encryption
machine learning algorithms
Resiliency
pubcrawl
Cryptography
Metrics
Prediction algorithms
machine learning
Human Factors
Ciphers
Homomorphic encryption
linear regression
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
Homomorphic encryption
storage paradigm
Scalability
Resiliency
public-key cryptosystem
pubcrawl
Paillier homomorphic encryption scheme
Paillier homomorphic cryptosystem
paillier cryptosystem
modular multiplicative arithmetic
Metrics
improved decryption process
Human Factors
Algorithm
fast decryption process
fast decryption algorithm
encryption
encrypted data
decryption speed
decryption
data privacy
Cryptography
Computational efficiency
computational cost
Complexity theory
Cathode ray tubes
biblio
A Noise-Free Homomorphic Encryption based on Chaotic System
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
noise-free homomorphic encryption
EMORE algorithm
encryption-decryption time
enhanced matrix operation
FHE
floating-point number
homomorphism property
modular arithmetic operation
Noise Free
noise-free algorithm
EMORE
outsourced data computing
positive randomness properties
reliable cloud computing environment
reliable encryption
research topics
secure Cloud computing environment
secure encryption
symmetric algorithm
Correlation
Scalability
Cryptography
encrypted data
encryption
data privacy
Resiliency
pubcrawl
Metrics
Reliability
Cloud Computing
fully homomorphic encryption
Security analysis
Human Factors
Homomorphic encryption
outsourcing
chaotic system
Sensitivity
Symmetric matrices
biblio
Multi-Key Homomorphic Encryption Create new Multiple Logic Gates and Arithmetic Circuit
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
Homomorphic encryption
multikey homomorphic encryption
multi-party computation
MK-TFHE library
arithmetic circuit
digital arithmetic
Logic gates
Boolean Circuit
arithmetic operations
Arithmetic Algorithm
Cloud Computing
Human Factors
cloud services
Metrics
pubcrawl
Resiliency
telecommunication security
Cryptography
Scalability
biblio
Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
authenticity
privacy preserving data aggregation
mobility awareness
location related awareness
Io
homomorphic encryption algorithms
Cloud Securit
fog node
Homomorphic encryption
cloud environment
Fog computing
Human Factors
cloud services
Cloud Computing
False Data Injection
Metrics
privacy
pubcrawl
Resiliency
data integrity
IoT devices
Internet of Things
data privacy
Cryptography
Scalability
biblio
Machine Learning Method Based on Stream Homomorphic Encryption Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
Elliptic curve cryptography
stream homomorphic encryption computing
mobile positioning
KNN
k nearest neighbors
computational time
computational resources
\$k\$ nearest neighbors
Homomorphic encryption
data analysis
estimation
Human Factors
security
Mathematical model
Distributed databases
Metrics
pubcrawl
Resiliency
machine learning
nearest neighbour methods
mobile computing
encryption
Cryptography
Scalability
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:33am
RSA
work flow
Terminology
public key cryptosystems
public key cryptosystem
Pailier
in-direct rapid homomorphic encryption
homomorphic encryption schemes
homomorphic cryptosystem
ElGamal based algebric homomorphic encryption
crypto-algorithms
Brakerski-Gentry-Vaikuntanathan model
Application of Homomorphic Encryption
Homomorphic encryption
Fog computing
Human Factors
Cloud Computing
edge computing
security threats
False Data Injection
public key cryptography
Data protection
Metrics
privacy
pubcrawl
Resiliency
data encryption
data integrity
encryption
Data Security
Servers
Scalability
biblio
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid
Submitted by grigby1 on Fri, 11/20/2020 - 2:04pm
Security analysis
policy-based governance
power meters
privacy
privacy-preserving lattice
pubcrawl
resilience
Resiliency
Scalability
security
Metrics
smart appliances
smart energy meters
Smart Grid
smart grid consumer privacy
Smart Grids
smart household appliances
smart meters
smart power grids
encryption
communication complexity
composability
consumer privacy
Cryptography
customer privacy protection
data aggregation
data privacy
domestic appliances
collaboration
home area network appliances
home energy use
homomorphic aggregation scheme
Homomorphic encryption
Human behavior
lattice-based homomorphic encryption
Logic gates
messages confidentiality
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
Protocols
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
service providers
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
collected location data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
sensitive data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »