NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 3.619
1.
  • A Survey on Homomorphic Enc... A Survey on Homomorphic Encryption Schemes
    Acar, Abbas; Aksu, Hidayet; Uluagac, A. Selcuk ... ACM computing surveys, 09/2019, Letnik: 51, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service ...
Celotno besedilo

PDF
2.
Celotno besedilo

PDF
3.
Celotno besedilo

PDF
4.
  • Homomorphic Encryption for ... Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics
    Wood, Alexander; Najarian, Kayvan; Kahrobaei, Delaram ACM computing surveys, 09/2020, Letnik: 53, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Machine learning and statistical techniques are powerful tools for analyzing large amounts of medical and genomic data. On the other hand, ethical concerns and privacy regulations prevent free ...
Celotno besedilo

PDF
5.
Celotno besedilo

PDF
6.
  • Membership-Mappings for Pra... Membership-Mappings for Practical Secure Distributed Deep Learning
    Kumar, Mohit; Zhang, Weiping; Fischer, Lukas ... IEEE transactions on fuzzy systems, 08/2023, Letnik: 31, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Problem : We consider the problem of privacy-preserving distributed deep learning where data privacy is protected by fully homomorphic encryption. Aim : The aim is to develop a method for practical ...
Celotno besedilo
7.
  • Privacy-Preserving Distribu... Privacy-Preserving Distributed Averaging via Homomorphically Encrypted Ratio Consensus
    Hadjicostis, Christoforos N.; Dominguez-Garcia, Alejandro D. IEEE transactions on automatic control, 09/2020, Letnik: 65, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    In this article, we develop distributed iterative algorithms that enable the components of a multicomponent system, each with some integer initial value, to asymptotically compute the average of ...
Celotno besedilo

PDF
8.
  • Silicon-Proven ASIC Design ... Silicon-Proven ASIC Design for the Polynomial Operations of Fully Homomorphic Encryption
    Nabeel, Mohammed; Gamil, Homer; Soni, Deepraj ... IEEE transactions on computer-aided design of integrated circuits and systems, 06/2024, Letnik: 43, Številka: 6
    Journal Article
    Recenzirano

    In this work, we elaborate on our endeavors to design, implement, fabricate, and post-silicon validate CoFHEE (Nabeel et al., 2023), a co-processor for low-level polynomial operations targeting fully ...
Celotno besedilo
9.
  • Homomorphic Encryption Homomorphic Encryption
    Ogburn, Monique; Turner, Claude; Dahal, Pushkar Procedia computer science, 2013, 2013-00-00, Letnik: 20
    Journal Article
    Recenzirano
    Odprti dostop

    The study of homomorphic encryption techniques has led to significant advancements in the computing domain, particularly in the sphere of cloud computing. Homomorphic encryption provides a means for ...
Celotno besedilo

PDF
10.
  • Privacy preservation for ma... Privacy preservation for machine learning training and classification based on homomorphic encryption schemes
    Li, Jing; Kuang, Xiaohui; Lin, Shujie ... Information sciences, July 2020, 2020-07-00, Letnik: 526
    Journal Article
    Recenzirano

    •This work presented a novel homomorphic encryption framework over non-abelian rings (matrix-ring). It is one-way secure based on the Conjugacy Search Problem.•The scheme supports real numbers ...
Celotno besedilo
1 2 3 4 5
zadetkov: 3.619

Nalaganje filtrov