Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
The wide use of wearable devices rises a lot of concerns about the privacy and security of personal data that are collected and stored by such services. This concern is even higher when such data is produced by healthcare monitoring... more
    • by  and +1
    •   8  
      Machine LearningHealthcareMicrocontrollersInternet of Things (IoT)
    • by 
    •   7  
      Computer ScienceDistributed ComputingComputer VisionData Mining
Security and efficiency of transferred data is the main concern in big data and cloud computing service. Fully Homomorphic Encryption is one of the most recent solutions that ensure the security and confidently. This paper expected to... more
    • by  and +2
    •   2  
      EncryptionHomomorphic Encryption
    • by 
    •   10  
      Distributed ComputingWireless Sensor NetworksComputer SoftwareData Integrity
Organizations and individuals have been moving to the cloud computing technology looking for effective and fast computing services. Confidential information is becoming more vulnerable to leak due to outsource computations to... more
    • by 
    •   7  
      Genetic AlgorithmsCryptographyEncryptionConfidentiality
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
    • by 
    •   18  
      Computer ScienceInformation SecurityInformation Security AuditingEncryption
An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from... more
    • by 
    •   4  
      EncryptionHomomorphic EncryptionElGamal Encryption SchemeEncryption Algorithms
    • by 
    •   3  
      Cloud ComputingMobile Cloud ComputingHomomorphic Encryption
Questo lavoro è diviso in due parti. Nella prima vi è uno studio dei concetti di privacy by design e by default introdotti col GDPR. Viene presentato uno strumento (questionario) in grado di analizzare la compliance al regolamento e... more
    • by 
    •   12  
      MathematicsMathematics of CryptographyPrivacyCryptography
    • by 
    •   3  
      Computer SimulationHomomorphic EncryptionEncryption Algorithms
The goal of this chapter is to present a survey of homomorphic encryption techniques and their applications. After a detailed discussion on the introduction and motivation of the chapter, we present some basic concepts of cryptography.... more
    • by 
    •   4  
      PrivacyCryptographyHomomorphic EncryptionEncryption Algorithms
Organizations and individuals have been shifting to the Internet-based cloud computing technology to obtain more efficient and faster computing services in recent years. However, moving to the cloud services has created new security... more
    • by 
    •   5  
      Information SecurityCryptographyCyber SecurityHomomorphic Encryption
    • by 
    •   3  
      Kernel MethodsHomomorphic EncryptionStruktur Aljabar
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security,... more
    • by 
    •   5  
      Optical Fiber CommunicationsNetwork SecurityCryptographyQuantum Cryptography
Wireless networks are truly pervasive in the modern environment: from the workplace and the home, to implanted medical devices. Network security, therefore, is of paramount importance. This volume begins with an overview of the security... more
    • by 
    •   6  
      Network SecurityWireless Sensor Network SecurityInformation Security and PrivacyWireless Mesh Network
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
    • by 
    •   18  
      Information SecurityInformation Security AuditingEncryptionInformation Security and Privacy
some selected solution on Assignments/Review Questions

From the Book: Data Communications & Networks by Forouzan. A  Behrouz By Lecturer: Prof. Daniel Okunbor
    • by 
    •   8  
      Computer ScienceMilitary IntelligenceWireless CommunicationsCryptography
Security has become one of the key features of data transmission on large database. RDBMS are used for storage purposes but with applications generating enormous amount of data, RDBMS is no longer efficient because RDBMS doesn't support... more
    • by 
    •   19  
      DatabasesNoSQLRDBMSDatabase Design
Although cloud computing continues to grow rapidly, shifting to Internet-based shared computing service has created new security challenge. Organizations move to the cloud technology looking for efficient and fast computing but data... more
    • by 
    •   7  
      AlgorithmsCryptographyEncryptionConfidentiality
NTRU is being considered as part of the NIST quantum resistant cryptography standard. While NIST has received substantial attention in the literature, more analysis is needed. This current study uses a unique approach. The team of... more
    • by 
    •   18  
      Mathematics of CryptographyCryptographyQuantum CryptographyEncryption
An encryption scheme is “homomorphic” if it is possible to perform implicit operation on the plaintext by processing the ciphertext only. The scheme is said to be “fully homomorphic’’ when we can perform (a sequence of operations) both... more
    • by 
    •   3  
      BootstrappingHomomorphic EncryptionFhe
    • by 
    •   4  
      Lattice Based CryptographyLattice CryptographyHomomorphic EncryptionFully Homomorphic Encryptions
    • by  and +1
    •   3  
      Cloud Computing SecurityHomomorphic EncryptionPlaintext
Homomorphic encryption is a type of encryption that allows performing operation on the ciphertext without having access to the plaintext. While the algorithm is still not efficient enough for practical applications, homomorphic encryption... more
    • by  and +2
    •   7  
      MathematicsComputer ScienceAlgorithmsLattice Theory
    • by 
    •   2  
      Cloud ComputingHomomorphic Encryption
This paper presents an application for an e-voting system on Android OS. Our study is about Elliptic Curve Cryptography (ECC) that has features of homomorphic encryption. This application is aimed to develop an electronic election... more
    • by 
    •   5  
      Android OsE-Voting SystemHomomorphic EncryptionElliptic Curve Cryptography
    • by 
    •   6  
      Computer ScienceComputer EngineeringSecurityCloud Computing
    • by 
    •   10  
      Wireless Sensor NetworksEncryptionProtocolsConfidentiality
    • by 
    •   7  
      Complexity TheoryCryptographyEfficient Algorithm for ECG CodingSource Code
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form... more
    • by 
    •   17  
      InformaticsKnowledge ManagementPrivacyCryptography
Data Mining has gained attention nowadays in the field of sales, marketing, insurance and healthcare applications to name a few. Organizations aspire to perform mining operations on their joint datasets for gaining trade benefits while... more
    • by 
    •   3  
      Data MiningHomomorphic EncryptionUnified Modeling Language (UML)
The biggest advantage of building “intelligence” into a sensor is that the sensor can process data before sending them to a data consumer. The kind of processing that is often needed is to aggregate the data into a more compact... more
    • by 
    •   44  
      EngineeringCognitive ScienceDistributed ComputingTechnology
An encryption scheme is “homomorphic” if it is possible to perform implicit operation on the plaintext by processing the ciphertext only. The scheme is said to be “fully homomorphic’’ when we can perform (a sequence of operations) both... more
    • by 
    •   3  
      BootstrappingHomomorphic EncryptionFhe
Organizations and individuals have been shifting to the Internet-based cloud computing technology to obtain more efficient and faster computing services in recent years. However, moving to the cloud services has created new security... more
    • by 
    •   5  
      Information SecurityCryptographyCyber SecurityHomomorphic Encryption
During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very... more
    • by  and +1
    •   15  
      PKI (Cryptography)SecurityPublic Key InfrastructureEncryption
Recently there has been a huge interest in secure and private cloud computing. In particular; to perform signal processing and machine learning tasks in the encrypted domain. Homomorphic encryption offers provably secure, asymmetric... more
    • by 
    •   8  
      Information SecurityMachine LearningCompressed SensingRandom Projections
    • by 
    •   4  
      CryptographyProvable SecurityPublic key cryptographyHomomorphic Encryption
MORE (Matrix Operation for Randomization or Encryption) is a free-noise fully homomorphic encryption scheme [8]. It is a symmetric scheme invented in 2012 by Kipnis and Hibshoush. The homomorphy of this cryptosystem is obtained via matrix... more
    • by 
    •   9  
      Information SecurityNetwork SecurityComputer SecurityCryptography
    • by 
    •   6  
      Provable SecurityData SecurityHomomorphic EncryptionMobile Computer
    • by 
    •   4  
      PrivacyCryptographyCloud SecurityHomomorphic Encryption
One of the most widespread computer applications used for person-to-person or organization-to-organization communication is the electronic mail (email or e-mail). The main objective for this study is to develop an emailing solution that... more
    • by 
    •   6  
      Dynamic Load BalancingLoad BalancingCloud Computing SecurityThreshold Cryptography
    • by 
    •   3  
      Computer ScienceEncryptionHomomorphic Encryption
This paper details Implementation of the Encryption algorithm AES under VHDL language In FPGA by using different architecture of mixcolumn. We then review this research investigates the AES algorithm in FPGA and the Very High Speed... more
    • by 
    •   18  
      Vlsi DesignAestheticsFPGACommunication systems
In this paper, the notion α -anti fuzzy new-ideal of a PU-algebra are defined and discussed. The homomorphic images (pre images) ofα -anti fuzzy new-ideal under homomorphism of a PU-algebras has been obtained. Some related result have... more
    • by 
    •   15  
      AlgebraFuzzy LogicFuzzy Expert SystemNumerical Linear Algebra
    • by 
    • Homomorphic Encryption
    • by 
    •   6  
      Electronic VotingProtocol AnalysisVideo ConferencingHomomorphic Encryption
Cloud computing is technology based on the internet. Computing actually took place on a computer that is not the one currently being used, mostly remote. Data obtained and processed by them. Cloud encryption is required because, when it... more
    • by  and +1
    •   19  
      CloudsEcclesiologyEncryptionCloud Computing
In recent years, the trend has increased for the use of cloud computing, which provides broad capabilities with the sharing of resources, and thus it is possible to store and process data in the cloud remotely, but this (cloud) is... more
    • by 
    •   5  
      Cloud ComputingRSAHomomorphic EncryptionBanking data
Wireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station. Hence,... more
    • by 
    •   41  
      EngineeringCognitive ScienceDistributed ComputingTechnology