Artykuły w czasopismach na temat „Homomorphic Secret Sharing”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Homomorphic Secret Sharing”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Wang, Sinan, Changgen Peng, Xinxin Deng, Zongfeng Peng i Qihong Chen. "Verifiable Additive Homomorphic Secret Sharing with Dynamic Aggregation Support". Electronics 13, nr 12 (18.06.2024): 2378. http://dx.doi.org/10.3390/electronics13122378.
Pełny tekst źródłaErsoy, Oğuzhan, Thomas Brochmann Pedersen i Emin Anarim. "Homomorphic extensions of CRT-based secret sharing". Discrete Applied Mathematics 285 (październik 2020): 317–29. http://dx.doi.org/10.1016/j.dam.2020.06.006.
Pełny tekst źródłaTsaloli, Georgia, Gustavo Banegas i Aikaterini Mitrokotsa. "Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing". Cryptography 4, nr 3 (21.09.2020): 25. http://dx.doi.org/10.3390/cryptography4030025.
Pełny tekst źródłaLiu, Mulan, i Zhanfei Zhou. "Ideal homomorphic secret sharing schemes over cyclic groups". Science in China Series E: Technological Sciences 41, nr 6 (grudzień 1998): 650–60. http://dx.doi.org/10.1007/bf02917049.
Pełny tekst źródłaHe, Yan, i Liang Feng Zhang. "Cheater-identifiable homomorphic secret sharing for outsourcing computations". Journal of Ambient Intelligence and Humanized Computing 11, nr 11 (2.03.2020): 5103–13. http://dx.doi.org/10.1007/s12652-020-01814-5.
Pełny tekst źródłaPatel, Sankita, Mitali Sonar i Devesh C. Jinwala. "Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme". International Journal of Distributed Systems and Technologies 5, nr 2 (kwiecień 2014): 44–70. http://dx.doi.org/10.4018/ijdst.2014040104.
Pełny tekst źródłaNanavati, Nirali R., Neeraj Sen i Devesh C. Jinwala. "Analysis and Evaluation of Novel Privacy Preserving Techniques for Collaborative Temporal Association Rule Mining Using Secret Sharing". International Journal of Distributed Systems and Technologies 5, nr 3 (lipiec 2014): 58–76. http://dx.doi.org/10.4018/ijdst.2014070103.
Pełny tekst źródłaGhasemi, Fatemeh, Reza Kaboli, Shahram Khazaei, Maghsoud Parviz i Mohammad-Mahdi Rafiei. "On ideal homomorphic secret sharing schemes and their decomposition". Designs, Codes and Cryptography 89, nr 9 (16.06.2021): 2079–96. http://dx.doi.org/10.1007/s10623-021-00901-8.
Pełny tekst źródłaMejia, Carolina, i J. Andrés Montoya. "On the information rates of homomorphic secret sharing schemes". Journal of Information and Optimization Sciences 39, nr 7 (2.05.2018): 1463–82. http://dx.doi.org/10.1080/02522667.2017.1367513.
Pełny tekst źródłaYan, Yao Jun, i Hai Yan Hu. "Research and Realization of Security Electronic Voting Plan Based on Homomorphic Commitment Verifiable Secret Sharing". Applied Mechanics and Materials 263-266 (grudzień 2012): 1673–76. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1673.
Pełny tekst źródłaSalim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee i Jong Hyuk Park. "Homomorphic Encryption Based Privacy-Preservation for IoMT". Applied Sciences 11, nr 18 (20.09.2021): 8757. http://dx.doi.org/10.3390/app11188757.
Pełny tekst źródłaMa, Chunguang, Juyan Li i Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment". International Journal of Foundations of Computer Science 28, nr 06 (wrzesień 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Pełny tekst źródłaMao, Dong, Qiongqian Yang, Hongkai Wang, Zuge Chen, Chen Li, Yubo Song i Zhongyuan Qin. "EPFed: Achieving Optimal Balance between Privacy and Efficiency in Federated Learning". Electronics 13, nr 6 (9.03.2024): 1028. http://dx.doi.org/10.3390/electronics13061028.
Pełny tekst źródłaLiu, Kun, i Chunming Tang. "Secure Two-Party Decision Tree Classification Based on Function Secret Sharing". Complexity 2023 (31.10.2023): 1–13. http://dx.doi.org/10.1155/2023/5302915.
Pełny tekst źródłaZhang, En, Jun-Zhe Zhu, Gong-Li Li, Jian Chang i Yu Li. "Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation". Security and Communication Networks 2019 (10.10.2019): 1–8. http://dx.doi.org/10.1155/2019/6989383.
Pełny tekst źródłaYang, Ching-Nung, Xiaotian Wu, Hsuan-Yu Lin i Cheonshik Kim. "Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation". Journal of Information Security and Applications 61 (wrzesień 2021): 102910. http://dx.doi.org/10.1016/j.jisa.2021.102910.
Pełny tekst źródłaShen, Cong, Wei Zhang, Tanping Zhou i Lingling Zhang. "A Security-Enhanced Federated Learning Scheme Based on Homomorphic Encryption and Secret Sharing". Mathematics 12, nr 13 (27.06.2024): 1993. http://dx.doi.org/10.3390/math12131993.
Pełny tekst źródłaShenets, N. N. "Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing". Automatic Control and Computer Sciences 51, nr 8 (grudzień 2017): 936–46. http://dx.doi.org/10.3103/s0146411617080193.
Pełny tekst źródłaLi, Li, Ahmed A. Abd El-Latif i Xiamu Niu. "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images". Signal Processing 92, nr 4 (kwiecień 2012): 1069–78. http://dx.doi.org/10.1016/j.sigpro.2011.10.020.
Pełny tekst źródłaDinur, Itai, Nathan Keller i Ohad Klein. "An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing". Journal of Cryptology 33, nr 3 (26.09.2019): 824–73. http://dx.doi.org/10.1007/s00145-019-09330-2.
Pełny tekst źródłaRehman, Amjad, Tanzila Saba, Khalid Haseeb, Souad Larabi Marie-Sainte i Jaime Lloret. "Energy-Efficient IoT e-Health Using Artificial Intelligence Model with Homomorphic Secret Sharing". Energies 14, nr 19 (7.10.2021): 6414. http://dx.doi.org/10.3390/en14196414.
Pełny tekst źródłaWüller, Stefan, Daniel Mayer, Fabian Förg, Samuel Schüppen, Benjamin Assadsolimani, Ulrike Meyer i Susanne Wetzel. "Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques". Journal of Computer Security 25, nr 1 (16.03.2017): 59–81. http://dx.doi.org/10.3233/jcs-16830.
Pełny tekst źródłaShankar, K., Mohamed Elhoseny, R. Satheesh Kumar, S. K. Lakshmanaprabu i Xiaohui Yuan. "Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique". Journal of Ambient Intelligence and Humanized Computing 11, nr 5 (10.12.2018): 1821–33. http://dx.doi.org/10.1007/s12652-018-1161-0.
Pełny tekst źródłaLiang, Ziyuan, Qi’ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanhheng Lu i Fan Zhang. "SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 2 (12.03.2024): 819–43. http://dx.doi.org/10.46586/tches.v2024.i2.819-843.
Pełny tekst źródłaHua, Na, Juyan Li, Kejia Zhang i Long Zhang. "A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices". International Journal of Information Security and Privacy 16, nr 1 (1.01.2022): 1–17. http://dx.doi.org/10.4018/ijisp.310936.
Pełny tekst źródłaAli, Sijjad, Shuaib Ahmed Wadho, Aun Yichiet, Ming Lee Gan i Chen Kang Lee. "Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing". Egyptian Informatics Journal 27 (wrzesień 2024): 100519. http://dx.doi.org/10.1016/j.eij.2024.100519.
Pełny tekst źródłaLiu, Lin, Jinshu Su, Baokang Zhao, Qiong Wang, Jinrong Chen i Yuchuan Luo. "Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things". Symmetry 12, nr 1 (6.01.2020): 103. http://dx.doi.org/10.3390/sym12010103.
Pełny tekst źródłaLu, Yao, Tianshu Zhou, Yu Tian, Shiqiang Zhu i Jingsong Li. "Web-Based Privacy-Preserving Multicenter Medical Data Analysis Tools Via Threshold Homomorphic Encryption: Design and Development Study". Journal of Medical Internet Research 22, nr 12 (8.12.2020): e22555. http://dx.doi.org/10.2196/22555.
Pełny tekst źródłaYildizli, Can Brochmann, Thomas Pedersen, Yucel Saygin, Erkay Savas i Albert Levi. "Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data". International Journal of Data Warehousing and Mining 7, nr 1 (styczeń 2011): 46–66. http://dx.doi.org/10.4018/jdwm.2011010103.
Pełny tekst źródłaLiu, Wei, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui i Dong Zheng. "Secure and Efficient Smart Healthcare System Based on Federated Learning". International Journal of Intelligent Systems 2023 (27.02.2023): 1–12. http://dx.doi.org/10.1155/2023/8017489.
Pełny tekst źródłaPereira, Diogo, Paulo Ricardo Reis i Fábio Borges. "Secure Aggregation Protocol Based on DC-Nets and Secret Sharing for Decentralized Federated Learning". Sensors 24, nr 4 (17.02.2024): 1299. http://dx.doi.org/10.3390/s24041299.
Pełny tekst źródłaCheng, Nan, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita i Kazunari Tozawa. "Constant-Round Private Decision Tree Evaluation for Secret Shared Data". Proceedings on Privacy Enhancing Technologies 2024, nr 1 (styczeń 2024): 397–412. http://dx.doi.org/10.56553/popets-2024-0023.
Pełny tekst źródłaZhou, Zhou, Youliang Tian i Changgen Peng. "Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching". Wireless Communications and Mobile Computing 2021 (26.06.2021): 1–14. http://dx.doi.org/10.1155/2021/6692061.
Pełny tekst źródłaFroelicher, David, Patricia Egger, João Sá Sousa, Jean Louis Raisaro, Zhicong Huang, Christian Mouchet, Bryan Ford i Jean-Pierre Hubaux. "UnLynx: A Decentralized System for Privacy-Conscious Data Sharing". Proceedings on Privacy Enhancing Technologies 2017, nr 4 (1.10.2017): 232–50. http://dx.doi.org/10.1515/popets-2017-0047.
Pełny tekst źródłaNanavati, Nirali R., Prakash Lalwani i Devesh C. Jinwala. "Analysis and Evaluation of Schemes for Secure Sum in Collaborative Frequent Itemset Mining across Horizontally Partitioned Data". Journal of Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/470416.
Pełny tekst źródłaLi, Li, Ahmed A. Abd El-Latif i Xiamu Niu. "Corrigendum to “Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images” [Signal Process. 92 (2012) 1069–1078]". Signal Processing 92, nr 9 (wrzesień 2012): 2339–40. http://dx.doi.org/10.1016/j.sigpro.2012.01.021.
Pełny tekst źródłaGao, Qi, Yi Sun, Xingyuan Chen, Fan Yang i Youhe Wang. "An Efficient Multi-Party Secure Aggregation Method Based on Multi-Homomorphic Attributes". Electronics 13, nr 4 (6.02.2024): 671. http://dx.doi.org/10.3390/electronics13040671.
Pełny tekst źródłaZhou, Jiapeng, Yuxiang Feng, Zhenyu Wang i Danyi Guo. "Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain". Sensors 21, nr 4 (23.02.2021): 1540. http://dx.doi.org/10.3390/s21041540.
Pełny tekst źródłaTassa, Tamir, Tal Grinshpoun i Roie Zivan. "Privacy Preserving Implementation of the Max-Sum Algorithm and its Variants". Journal of Artificial Intelligence Research 59 (17.07.2017): 311–49. http://dx.doi.org/10.1613/jair.5504.
Pełny tekst źródłaKaji, Shizuo, Toshiaki Maeno, Koji Nuida i Yasuhide Numata. "Polynomial expressions of p-ary auction functions". Journal of Mathematical Cryptology 13, nr 2 (1.06.2019): 69–80. http://dx.doi.org/10.1515/jmc-2018-0016.
Pełny tekst źródłaWang, Ruyan, Shiqi Zhang, Zhigang Yang, Puning Zhang, Dapeng Wu, Yongling Lu i Alexander Fedotov. "Private Data Aggregation Based on Fog-Assisted Authentication for Mobile Crowd Sensing". Security and Communication Networks 2021 (22.09.2021): 1–12. http://dx.doi.org/10.1155/2021/7354316.
Pełny tekst źródłaBaum, Carsten, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl i Juan Ramón Troncoso-Pastoriza. "Efficient protocols for oblivious linear function evaluation from ring-LWE1". Journal of Computer Security 30, nr 1 (20.01.2022): 39–78. http://dx.doi.org/10.3233/jcs-200116.
Pełny tekst źródłaZhong, Jiayong, i Xiaofu Xiong. "Data Security Storage Method for Power Distribution Internet of Things in Cyber-Physical Energy Systems". Wireless Communications and Mobile Computing 2021 (2.01.2021): 1–15. http://dx.doi.org/10.1155/2021/6694729.
Pełny tekst źródłaK Ravindranath, P. Raja Sekhar Reddy ,. "Enhancing Secure and Reliable Data Transfer through Robust Integrity". Journal of Electrical Systems 20, nr 1s (28.03.2024): 900–910. http://dx.doi.org/10.52783/jes.841.
Pełny tekst źródłaShiriaev, Egor, Tatiana Ermakova, Ekaterina Bezuglova, Maria A. Lapina i Mikhail Babenko. "Reliablity and Security for Fog Computing Systems". Information 15, nr 6 (29.05.2024): 317. http://dx.doi.org/10.3390/info15060317.
Pełny tekst źródłaWu, Yuncheng, Naili Xing, Gang Chen, Tien Tuan Anh Dinh, Zhaojing Luo, Beng Chin Ooi, Xiaokui Xiao i Meihui Zhang. "Falcon: A Privacy-Preserving and Interpretable Vertical Federated Learning System". Proceedings of the VLDB Endowment 16, nr 10 (czerwiec 2023): 2471–84. http://dx.doi.org/10.14778/3603581.3603588.
Pełny tekst źródłaH, Tarun Singh. "Review of Data Security and Privacy in Cloud Computing". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 06 (3.06.2024): 1–5. http://dx.doi.org/10.55041/ijsrem35422.
Pełny tekst źródłaZhou, Jun, i Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme". Applied Mechanics and Materials 411-414 (wrzesień 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.
Pełny tekst źródłaShah, Aayush, Prabhat Mahato i Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, nr 8 (31.08.2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Pełny tekst źródłaPotdukhe, Hitesh. "Exploratory Review: Decentralized Voting System Using Blockchain". International Journal for Research in Applied Science and Engineering Technology 9, nr 11 (30.11.2021): 1082–86. http://dx.doi.org/10.22214/ijraset.2021.38948.
Pełny tekst źródła