Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Homomorphic encryption
biblio
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
Homomorphic encryption
Computing Theory and Privacy
statistical measures
secure multi-party computation
product cost optimisation
privacy-preserving benchmarking systems
Oblivious transfer
key performance indicators
key figure comparison
cloud-based privacy-preserving benchmarking
cloud-based KPI comparison
cloud-based
benchmarking system
Benchmarking
software performance evaluation
Cloud Computing
Privacy-preserving
Benchmark testing
Complexity theory
statistical analysis
Companies
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
encryption
Cryptography
Scalability
biblio
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
Submitted by grigby1 on Fri, 08/28/2020 - 3:42pm
IITD database
Template Protection
secure systems
Scalability
Resiliency
resilience
Recognition accuracy
pubcrawl
Probes
privacy issues
permanent protection
Metrics
iris-coding
iris-biometric verification
Iris recognition
Image coding
biometric encryption
identification mode
Homomorphic encryption
Hamming distance
feature extraction
encryption domain scheme
encryption
early decision making strategy
Decision Making
Cryptography
computationally efficient application
computational overload
block-wise comparison
biometrics (access control)
biometric recognition systems
biblio
Privacy-Preserving Deep Learning Models for Law Big Data Feature Learning
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
law Big data feature learning
social networks
social networking (online)
Servers
Scalability
Resiliency
pubcrawl
privacy-preserving feature learning
privacy-preserving deep learning models
privacy
neural nets
Metrics
learning (artificial intelligence)
Big Data
Knowledge extraction
IoT
Internet of Things
Human Factors
Homomorphic encryption
differential privacy
deep learning
data privacy
Data models
Cryptography
big data privacy
biblio
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
malicious individuals
localization
indoor radio
Android app
Buildings
Columbia University dormitory
Fingerprinting
GPS signals
homo-morphic cryptographic schemes
Indoor environments
Metrics
server computation capabilities
server-side fingerprint-based indoor localization
socialist millionaire problem
unique encrypted sorting capability
Wi-Fi
Wi-Fi access points
wireless signals
android encryption
pubcrawl
Servers
Cryptography
encryption
data privacy
telecommunication security
Protocols
mobile computing
Resiliency
Human behavior
Scalability
privacy
Databases
smart phones
wireless LAN
Wireless fidelity
Homomorphic encryption
efficiency
fingerprint identification
biblio
PlaidML-HE: Acceleration of Deep Learning Kernels to Compute on Encrypted Data
Submitted by grigby1 on Fri, 08/07/2020 - 3:48pm
machine learning as a service
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving machine learning
privacy
PPML inference
PlaidML-HE
MLaaS
ML Service
ML kernels
ML front-end frameworks
AI
machine learning
learning (artificial intelligence)
inference mechanisms
Human Factors
Human behavior
Homomorphic encryption
encrypted data
deep learning kernels
data privacy
Cryptography
cryptographic primitives
compiler
biblio
Elliptic curve and Lattice cryptosystem
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
lattice
Vectors
square matrices
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
matrix algebra
Lattices
lattice-based cryptography
lattice cryptosystem
closest vector problem
Homomorphic encryption
finite local ring
encryption
Elliptic curves
Elliptic curve over a ring
Elliptic curve cryptography
elliptic curve
discrete logarithm
digital signatures
Diffie-Hellman
cryptography method
conjugate problem
biblio
Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
ECC
State Cryptography Administration
SM2 signature generation schemes
SM2 digital signature generation
SM2
secure cloud cryptography computing
secret sharing based cryptography
key exchange schemes
elliptic curve public key cryptography algorithm
additively homomorphic encryption
China
secret sharing
Homomorphic encryption
Cloud Computing
Elliptic curves
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
Software
data encryption
encryption
digital signature
Scalability
biblio
Fully homomorphic encryption scheme on a nonCommutative ring R
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
fully homomorphic encryption scheme
Scalability
Resiliency
pubcrawl
noncommutative ring
Non commutative ring
Metrics
Large scale integration
Human Factors
Homomorphic encryption
Cloud Computing
Fully homomorphic cryptosystems
encryption scheme
encryption
Elliptic curves
Elliptic curve cryptography
Cryptography
conjugate problem
conjugate gradient methods
Conjugal problem
biblio
Integrate Dragonfly Key Exchange (IETF - RFC 7664) into Arithmetic Circuit Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
public keys
RFC7664
integrate dragonfly key exchange
implementation method
Fast Fully Homomorphic Encryption
Dragonfly Key Exchange
arithmetic circuit homomorphic encryption
arithmetic circuit
ACHE
Private keys
advanced encryption standard
Scalability
Homomorphic encryption
Human Factors
authentication
public key cryptography
Metrics
pubcrawl
Resiliency
private key cryptography
key size
biblio
Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
Homomorphic encryption
storage management
Servers
security
Scalability
Resiliency
pubcrawl
Metrics
matrix multiplication
Matrix converters
information security
Human Factors
Ciphers
extended hill cipher encryption
Extended Hill Cipher
encryption algorithm
encryption
data storage
data privacy
Cryptography
cloud storage
cloud providers
cloud network
Cloud Computing
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »