Artículos de revistas sobre el tema "Homomorphic Secret Sharing"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Homomorphic Secret Sharing".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Wang, Sinan, Changgen Peng, Xinxin Deng, Zongfeng Peng y Qihong Chen. "Verifiable Additive Homomorphic Secret Sharing with Dynamic Aggregation Support". Electronics 13, n.º 12 (18 de junio de 2024): 2378. http://dx.doi.org/10.3390/electronics13122378.
Texto completoErsoy, Oğuzhan, Thomas Brochmann Pedersen y Emin Anarim. "Homomorphic extensions of CRT-based secret sharing". Discrete Applied Mathematics 285 (octubre de 2020): 317–29. http://dx.doi.org/10.1016/j.dam.2020.06.006.
Texto completoTsaloli, Georgia, Gustavo Banegas y Aikaterini Mitrokotsa. "Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing". Cryptography 4, n.º 3 (21 de septiembre de 2020): 25. http://dx.doi.org/10.3390/cryptography4030025.
Texto completoLiu, Mulan y Zhanfei Zhou. "Ideal homomorphic secret sharing schemes over cyclic groups". Science in China Series E: Technological Sciences 41, n.º 6 (diciembre de 1998): 650–60. http://dx.doi.org/10.1007/bf02917049.
Texto completoHe, Yan y Liang Feng Zhang. "Cheater-identifiable homomorphic secret sharing for outsourcing computations". Journal of Ambient Intelligence and Humanized Computing 11, n.º 11 (2 de marzo de 2020): 5103–13. http://dx.doi.org/10.1007/s12652-020-01814-5.
Texto completoPatel, Sankita, Mitali Sonar y Devesh C. Jinwala. "Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme". International Journal of Distributed Systems and Technologies 5, n.º 2 (abril de 2014): 44–70. http://dx.doi.org/10.4018/ijdst.2014040104.
Texto completoNanavati, Nirali R., Neeraj Sen y Devesh C. Jinwala. "Analysis and Evaluation of Novel Privacy Preserving Techniques for Collaborative Temporal Association Rule Mining Using Secret Sharing". International Journal of Distributed Systems and Technologies 5, n.º 3 (julio de 2014): 58–76. http://dx.doi.org/10.4018/ijdst.2014070103.
Texto completoGhasemi, Fatemeh, Reza Kaboli, Shahram Khazaei, Maghsoud Parviz y Mohammad-Mahdi Rafiei. "On ideal homomorphic secret sharing schemes and their decomposition". Designs, Codes and Cryptography 89, n.º 9 (16 de junio de 2021): 2079–96. http://dx.doi.org/10.1007/s10623-021-00901-8.
Texto completoMejia, Carolina y J. Andrés Montoya. "On the information rates of homomorphic secret sharing schemes". Journal of Information and Optimization Sciences 39, n.º 7 (2 de mayo de 2018): 1463–82. http://dx.doi.org/10.1080/02522667.2017.1367513.
Texto completoYan, Yao Jun y Hai Yan Hu. "Research and Realization of Security Electronic Voting Plan Based on Homomorphic Commitment Verifiable Secret Sharing". Applied Mechanics and Materials 263-266 (diciembre de 2012): 1673–76. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1673.
Texto completoSalim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee y Jong Hyuk Park. "Homomorphic Encryption Based Privacy-Preservation for IoMT". Applied Sciences 11, n.º 18 (20 de septiembre de 2021): 8757. http://dx.doi.org/10.3390/app11188757.
Texto completoMa, Chunguang, Juyan Li y Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Texto completoMao, Dong, Qiongqian Yang, Hongkai Wang, Zuge Chen, Chen Li, Yubo Song y Zhongyuan Qin. "EPFed: Achieving Optimal Balance between Privacy and Efficiency in Federated Learning". Electronics 13, n.º 6 (9 de marzo de 2024): 1028. http://dx.doi.org/10.3390/electronics13061028.
Texto completoLiu, Kun y Chunming Tang. "Secure Two-Party Decision Tree Classification Based on Function Secret Sharing". Complexity 2023 (31 de octubre de 2023): 1–13. http://dx.doi.org/10.1155/2023/5302915.
Texto completoZhang, En, Jun-Zhe Zhu, Gong-Li Li, Jian Chang y Yu Li. "Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation". Security and Communication Networks 2019 (10 de octubre de 2019): 1–8. http://dx.doi.org/10.1155/2019/6989383.
Texto completoYang, Ching-Nung, Xiaotian Wu, Hsuan-Yu Lin y Cheonshik Kim. "Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation". Journal of Information Security and Applications 61 (septiembre de 2021): 102910. http://dx.doi.org/10.1016/j.jisa.2021.102910.
Texto completoShen, Cong, Wei Zhang, Tanping Zhou y Lingling Zhang. "A Security-Enhanced Federated Learning Scheme Based on Homomorphic Encryption and Secret Sharing". Mathematics 12, n.º 13 (27 de junio de 2024): 1993. http://dx.doi.org/10.3390/math12131993.
Texto completoShenets, N. N. "Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing". Automatic Control and Computer Sciences 51, n.º 8 (diciembre de 2017): 936–46. http://dx.doi.org/10.3103/s0146411617080193.
Texto completoLi, Li, Ahmed A. Abd El-Latif y Xiamu Niu. "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images". Signal Processing 92, n.º 4 (abril de 2012): 1069–78. http://dx.doi.org/10.1016/j.sigpro.2011.10.020.
Texto completoDinur, Itai, Nathan Keller y Ohad Klein. "An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing". Journal of Cryptology 33, n.º 3 (26 de septiembre de 2019): 824–73. http://dx.doi.org/10.1007/s00145-019-09330-2.
Texto completoRehman, Amjad, Tanzila Saba, Khalid Haseeb, Souad Larabi Marie-Sainte y Jaime Lloret. "Energy-Efficient IoT e-Health Using Artificial Intelligence Model with Homomorphic Secret Sharing". Energies 14, n.º 19 (7 de octubre de 2021): 6414. http://dx.doi.org/10.3390/en14196414.
Texto completoWüller, Stefan, Daniel Mayer, Fabian Förg, Samuel Schüppen, Benjamin Assadsolimani, Ulrike Meyer y Susanne Wetzel. "Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques". Journal of Computer Security 25, n.º 1 (16 de marzo de 2017): 59–81. http://dx.doi.org/10.3233/jcs-16830.
Texto completoShankar, K., Mohamed Elhoseny, R. Satheesh Kumar, S. K. Lakshmanaprabu y Xiaohui Yuan. "Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique". Journal of Ambient Intelligence and Humanized Computing 11, n.º 5 (10 de diciembre de 2018): 1821–33. http://dx.doi.org/10.1007/s12652-018-1161-0.
Texto completoLiang, Ziyuan, Qi’ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanhheng Lu y Fan Zhang. "SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 2 (12 de marzo de 2024): 819–43. http://dx.doi.org/10.46586/tches.v2024.i2.819-843.
Texto completoHua, Na, Juyan Li, Kejia Zhang y Long Zhang. "A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices". International Journal of Information Security and Privacy 16, n.º 1 (1 de enero de 2022): 1–17. http://dx.doi.org/10.4018/ijisp.310936.
Texto completoAli, Sijjad, Shuaib Ahmed Wadho, Aun Yichiet, Ming Lee Gan y Chen Kang Lee. "Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing". Egyptian Informatics Journal 27 (septiembre de 2024): 100519. http://dx.doi.org/10.1016/j.eij.2024.100519.
Texto completoLiu, Lin, Jinshu Su, Baokang Zhao, Qiong Wang, Jinrong Chen y Yuchuan Luo. "Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things". Symmetry 12, n.º 1 (6 de enero de 2020): 103. http://dx.doi.org/10.3390/sym12010103.
Texto completoLu, Yao, Tianshu Zhou, Yu Tian, Shiqiang Zhu y Jingsong Li. "Web-Based Privacy-Preserving Multicenter Medical Data Analysis Tools Via Threshold Homomorphic Encryption: Design and Development Study". Journal of Medical Internet Research 22, n.º 12 (8 de diciembre de 2020): e22555. http://dx.doi.org/10.2196/22555.
Texto completoYildizli, Can Brochmann, Thomas Pedersen, Yucel Saygin, Erkay Savas y Albert Levi. "Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data". International Journal of Data Warehousing and Mining 7, n.º 1 (enero de 2011): 46–66. http://dx.doi.org/10.4018/jdwm.2011010103.
Texto completoLiu, Wei, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui y Dong Zheng. "Secure and Efficient Smart Healthcare System Based on Federated Learning". International Journal of Intelligent Systems 2023 (27 de febrero de 2023): 1–12. http://dx.doi.org/10.1155/2023/8017489.
Texto completoPereira, Diogo, Paulo Ricardo Reis y Fábio Borges. "Secure Aggregation Protocol Based on DC-Nets and Secret Sharing for Decentralized Federated Learning". Sensors 24, n.º 4 (17 de febrero de 2024): 1299. http://dx.doi.org/10.3390/s24041299.
Texto completoCheng, Nan, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita y Kazunari Tozawa. "Constant-Round Private Decision Tree Evaluation for Secret Shared Data". Proceedings on Privacy Enhancing Technologies 2024, n.º 1 (enero de 2024): 397–412. http://dx.doi.org/10.56553/popets-2024-0023.
Texto completoZhou, Zhou, Youliang Tian y Changgen Peng. "Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching". Wireless Communications and Mobile Computing 2021 (26 de junio de 2021): 1–14. http://dx.doi.org/10.1155/2021/6692061.
Texto completoFroelicher, David, Patricia Egger, João Sá Sousa, Jean Louis Raisaro, Zhicong Huang, Christian Mouchet, Bryan Ford y Jean-Pierre Hubaux. "UnLynx: A Decentralized System for Privacy-Conscious Data Sharing". Proceedings on Privacy Enhancing Technologies 2017, n.º 4 (1 de octubre de 2017): 232–50. http://dx.doi.org/10.1515/popets-2017-0047.
Texto completoNanavati, Nirali R., Prakash Lalwani y Devesh C. Jinwala. "Analysis and Evaluation of Schemes for Secure Sum in Collaborative Frequent Itemset Mining across Horizontally Partitioned Data". Journal of Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/470416.
Texto completoLi, Li, Ahmed A. Abd El-Latif y Xiamu Niu. "Corrigendum to “Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images” [Signal Process. 92 (2012) 1069–1078]". Signal Processing 92, n.º 9 (septiembre de 2012): 2339–40. http://dx.doi.org/10.1016/j.sigpro.2012.01.021.
Texto completoGao, Qi, Yi Sun, Xingyuan Chen, Fan Yang y Youhe Wang. "An Efficient Multi-Party Secure Aggregation Method Based on Multi-Homomorphic Attributes". Electronics 13, n.º 4 (6 de febrero de 2024): 671. http://dx.doi.org/10.3390/electronics13040671.
Texto completoZhou, Jiapeng, Yuxiang Feng, Zhenyu Wang y Danyi Guo. "Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain". Sensors 21, n.º 4 (23 de febrero de 2021): 1540. http://dx.doi.org/10.3390/s21041540.
Texto completoTassa, Tamir, Tal Grinshpoun y Roie Zivan. "Privacy Preserving Implementation of the Max-Sum Algorithm and its Variants". Journal of Artificial Intelligence Research 59 (17 de julio de 2017): 311–49. http://dx.doi.org/10.1613/jair.5504.
Texto completoKaji, Shizuo, Toshiaki Maeno, Koji Nuida y Yasuhide Numata. "Polynomial expressions of p-ary auction functions". Journal of Mathematical Cryptology 13, n.º 2 (1 de junio de 2019): 69–80. http://dx.doi.org/10.1515/jmc-2018-0016.
Texto completoWang, Ruyan, Shiqi Zhang, Zhigang Yang, Puning Zhang, Dapeng Wu, Yongling Lu y Alexander Fedotov. "Private Data Aggregation Based on Fog-Assisted Authentication for Mobile Crowd Sensing". Security and Communication Networks 2021 (22 de septiembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/7354316.
Texto completoBaum, Carsten, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl y Juan Ramón Troncoso-Pastoriza. "Efficient protocols for oblivious linear function evaluation from ring-LWE1". Journal of Computer Security 30, n.º 1 (20 de enero de 2022): 39–78. http://dx.doi.org/10.3233/jcs-200116.
Texto completoZhong, Jiayong y Xiaofu Xiong. "Data Security Storage Method for Power Distribution Internet of Things in Cyber-Physical Energy Systems". Wireless Communications and Mobile Computing 2021 (2 de enero de 2021): 1–15. http://dx.doi.org/10.1155/2021/6694729.
Texto completoK Ravindranath, P. Raja Sekhar Reddy ,. "Enhancing Secure and Reliable Data Transfer through Robust Integrity". Journal of Electrical Systems 20, n.º 1s (28 de marzo de 2024): 900–910. http://dx.doi.org/10.52783/jes.841.
Texto completoShiriaev, Egor, Tatiana Ermakova, Ekaterina Bezuglova, Maria A. Lapina y Mikhail Babenko. "Reliablity and Security for Fog Computing Systems". Information 15, n.º 6 (29 de mayo de 2024): 317. http://dx.doi.org/10.3390/info15060317.
Texto completoWu, Yuncheng, Naili Xing, Gang Chen, Tien Tuan Anh Dinh, Zhaojing Luo, Beng Chin Ooi, Xiaokui Xiao y Meihui Zhang. "Falcon: A Privacy-Preserving and Interpretable Vertical Federated Learning System". Proceedings of the VLDB Endowment 16, n.º 10 (junio de 2023): 2471–84. http://dx.doi.org/10.14778/3603581.3603588.
Texto completoH, Tarun Singh. "Review of Data Security and Privacy in Cloud Computing". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 06 (3 de junio de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem35422.
Texto completoZhou, Jun y Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme". Applied Mechanics and Materials 411-414 (septiembre de 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.
Texto completoShah, Aayush, Prabhat Mahato y Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Texto completoPotdukhe, Hitesh. "Exploratory Review: Decentralized Voting System Using Blockchain". International Journal for Research in Applied Science and Engineering Technology 9, n.º 11 (30 de noviembre de 2021): 1082–86. http://dx.doi.org/10.22214/ijraset.2021.38948.
Texto completo