Artigos de revistas sobre o tema "Homomorphic Secret Sharing"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Homomorphic Secret Sharing".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Ersoy, Oğuzhan, Thomas Brochmann Pedersen e Emin Anarim. "Homomorphic extensions of CRT-based secret sharing". Discrete Applied Mathematics 285 (outubro de 2020): 317–29. http://dx.doi.org/10.1016/j.dam.2020.06.006.
Texto completo da fonteTsaloli, Georgia, Gustavo Banegas e Aikaterini Mitrokotsa. "Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing". Cryptography 4, n.º 3 (21 de setembro de 2020): 25. http://dx.doi.org/10.3390/cryptography4030025.
Texto completo da fonteLiu, Mulan, e Zhanfei Zhou. "Ideal homomorphic secret sharing schemes over cyclic groups". Science in China Series E: Technological Sciences 41, n.º 6 (dezembro de 1998): 650–60. http://dx.doi.org/10.1007/bf02917049.
Texto completo da fonteHe, Yan, e Liang Feng Zhang. "Cheater-identifiable homomorphic secret sharing for outsourcing computations". Journal of Ambient Intelligence and Humanized Computing 11, n.º 11 (2 de março de 2020): 5103–13. http://dx.doi.org/10.1007/s12652-020-01814-5.
Texto completo da fontePatel, Sankita, Mitali Sonar e Devesh C. Jinwala. "Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme". International Journal of Distributed Systems and Technologies 5, n.º 2 (abril de 2014): 44–70. http://dx.doi.org/10.4018/ijdst.2014040104.
Texto completo da fonteNanavati, Nirali R., Neeraj Sen e Devesh C. Jinwala. "Analysis and Evaluation of Novel Privacy Preserving Techniques for Collaborative Temporal Association Rule Mining Using Secret Sharing". International Journal of Distributed Systems and Technologies 5, n.º 3 (julho de 2014): 58–76. http://dx.doi.org/10.4018/ijdst.2014070103.
Texto completo da fonteGhasemi, Fatemeh, Reza Kaboli, Shahram Khazaei, Maghsoud Parviz e Mohammad-Mahdi Rafiei. "On ideal homomorphic secret sharing schemes and their decomposition". Designs, Codes and Cryptography 89, n.º 9 (16 de junho de 2021): 2079–96. http://dx.doi.org/10.1007/s10623-021-00901-8.
Texto completo da fonteMejia, Carolina, e J. Andrés Montoya. "On the information rates of homomorphic secret sharing schemes". Journal of Information and Optimization Sciences 39, n.º 7 (2 de maio de 2018): 1463–82. http://dx.doi.org/10.1080/02522667.2017.1367513.
Texto completo da fonteSalim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee e Jong Hyuk Park. "Homomorphic Encryption Based Privacy-Preservation for IoMT". Applied Sciences 11, n.º 18 (20 de setembro de 2021): 8757. http://dx.doi.org/10.3390/app11188757.
Texto completo da fonteYan, Yao Jun, e Hai Yan Hu. "Research and Realization of Security Electronic Voting Plan Based on Homomorphic Commitment Verifiable Secret Sharing". Applied Mechanics and Materials 263-266 (dezembro de 2012): 1673–76. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1673.
Texto completo da fonteMa, Chunguang, Juyan Li e Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment". International Journal of Foundations of Computer Science 28, n.º 06 (setembro de 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Texto completo da fonteMao, Dong, Qiongqian Yang, Hongkai Wang, Zuge Chen, Chen Li, Yubo Song e Zhongyuan Qin. "EPFed: Achieving Optimal Balance between Privacy and Efficiency in Federated Learning". Electronics 13, n.º 6 (9 de março de 2024): 1028. http://dx.doi.org/10.3390/electronics13061028.
Texto completo da fonteLiu, Kun, e Chunming Tang. "Secure Two-Party Decision Tree Classification Based on Function Secret Sharing". Complexity 2023 (31 de outubro de 2023): 1–13. http://dx.doi.org/10.1155/2023/5302915.
Texto completo da fonteZhang, En, Jun-Zhe Zhu, Gong-Li Li, Jian Chang e Yu Li. "Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation". Security and Communication Networks 2019 (10 de outubro de 2019): 1–8. http://dx.doi.org/10.1155/2019/6989383.
Texto completo da fonteYang, Ching-Nung, Xiaotian Wu, Hsuan-Yu Lin e Cheonshik Kim. "Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation". Journal of Information Security and Applications 61 (setembro de 2021): 102910. http://dx.doi.org/10.1016/j.jisa.2021.102910.
Texto completo da fonteShenets, N. N. "Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing". Automatic Control and Computer Sciences 51, n.º 8 (dezembro de 2017): 936–46. http://dx.doi.org/10.3103/s0146411617080193.
Texto completo da fonteLi, Li, Ahmed A. Abd El-Latif e Xiamu Niu. "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images". Signal Processing 92, n.º 4 (abril de 2012): 1069–78. http://dx.doi.org/10.1016/j.sigpro.2011.10.020.
Texto completo da fonteDinur, Itai, Nathan Keller e Ohad Klein. "An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing". Journal of Cryptology 33, n.º 3 (26 de setembro de 2019): 824–73. http://dx.doi.org/10.1007/s00145-019-09330-2.
Texto completo da fonteRehman, Amjad, Tanzila Saba, Khalid Haseeb, Souad Larabi Marie-Sainte e Jaime Lloret. "Energy-Efficient IoT e-Health Using Artificial Intelligence Model with Homomorphic Secret Sharing". Energies 14, n.º 19 (7 de outubro de 2021): 6414. http://dx.doi.org/10.3390/en14196414.
Texto completo da fonteWüller, Stefan, Daniel Mayer, Fabian Förg, Samuel Schüppen, Benjamin Assadsolimani, Ulrike Meyer e Susanne Wetzel. "Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques". Journal of Computer Security 25, n.º 1 (16 de março de 2017): 59–81. http://dx.doi.org/10.3233/jcs-16830.
Texto completo da fonteShankar, K., Mohamed Elhoseny, R. Satheesh Kumar, S. K. Lakshmanaprabu e Xiaohui Yuan. "Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique". Journal of Ambient Intelligence and Humanized Computing 11, n.º 5 (10 de dezembro de 2018): 1821–33. http://dx.doi.org/10.1007/s12652-018-1161-0.
Texto completo da fonteLiang, Ziyuan, Qi’ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanhheng Lu e Fan Zhang. "SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 2 (12 de março de 2024): 819–43. http://dx.doi.org/10.46586/tches.v2024.i2.819-843.
Texto completo da fonteHua, Na, Juyan Li, Kejia Zhang e Long Zhang. "A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices". International Journal of Information Security and Privacy 16, n.º 1 (1 de janeiro de 2022): 1–17. http://dx.doi.org/10.4018/ijisp.310936.
Texto completo da fonteLiu, Lin, Jinshu Su, Baokang Zhao, Qiong Wang, Jinrong Chen e Yuchuan Luo. "Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things". Symmetry 12, n.º 1 (6 de janeiro de 2020): 103. http://dx.doi.org/10.3390/sym12010103.
Texto completo da fonteLu, Yao, Tianshu Zhou, Yu Tian, Shiqiang Zhu e Jingsong Li. "Web-Based Privacy-Preserving Multicenter Medical Data Analysis Tools Via Threshold Homomorphic Encryption: Design and Development Study". Journal of Medical Internet Research 22, n.º 12 (8 de dezembro de 2020): e22555. http://dx.doi.org/10.2196/22555.
Texto completo da fonteYildizli, Can Brochmann, Thomas Pedersen, Yucel Saygin, Erkay Savas e Albert Levi. "Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data". International Journal of Data Warehousing and Mining 7, n.º 1 (janeiro de 2011): 46–66. http://dx.doi.org/10.4018/jdwm.2011010103.
Texto completo da fontePereira, Diogo, Paulo Ricardo Reis e Fábio Borges. "Secure Aggregation Protocol Based on DC-Nets and Secret Sharing for Decentralized Federated Learning". Sensors 24, n.º 4 (17 de fevereiro de 2024): 1299. http://dx.doi.org/10.3390/s24041299.
Texto completo da fonteLiu, Wei, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui e Dong Zheng. "Secure and Efficient Smart Healthcare System Based on Federated Learning". International Journal of Intelligent Systems 2023 (27 de fevereiro de 2023): 1–12. http://dx.doi.org/10.1155/2023/8017489.
Texto completo da fonteCheng, Nan, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita e Kazunari Tozawa. "Constant-Round Private Decision Tree Evaluation for Secret Shared Data". Proceedings on Privacy Enhancing Technologies 2024, n.º 1 (janeiro de 2024): 397–412. http://dx.doi.org/10.56553/popets-2024-0023.
Texto completo da fonteZhou, Zhou, Youliang Tian e Changgen Peng. "Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching". Wireless Communications and Mobile Computing 2021 (26 de junho de 2021): 1–14. http://dx.doi.org/10.1155/2021/6692061.
Texto completo da fonteFroelicher, David, Patricia Egger, João Sá Sousa, Jean Louis Raisaro, Zhicong Huang, Christian Mouchet, Bryan Ford e Jean-Pierre Hubaux. "UnLynx: A Decentralized System for Privacy-Conscious Data Sharing". Proceedings on Privacy Enhancing Technologies 2017, n.º 4 (1 de outubro de 2017): 232–50. http://dx.doi.org/10.1515/popets-2017-0047.
Texto completo da fonteNanavati, Nirali R., Prakash Lalwani e Devesh C. Jinwala. "Analysis and Evaluation of Schemes for Secure Sum in Collaborative Frequent Itemset Mining across Horizontally Partitioned Data". Journal of Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/470416.
Texto completo da fonteLi, Li, Ahmed A. Abd El-Latif e Xiamu Niu. "Corrigendum to “Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images” [Signal Process. 92 (2012) 1069–1078]". Signal Processing 92, n.º 9 (setembro de 2012): 2339–40. http://dx.doi.org/10.1016/j.sigpro.2012.01.021.
Texto completo da fonteGao, Qi, Yi Sun, Xingyuan Chen, Fan Yang e Youhe Wang. "An Efficient Multi-Party Secure Aggregation Method Based on Multi-Homomorphic Attributes". Electronics 13, n.º 4 (6 de fevereiro de 2024): 671. http://dx.doi.org/10.3390/electronics13040671.
Texto completo da fonteZhou, Jiapeng, Yuxiang Feng, Zhenyu Wang e Danyi Guo. "Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain". Sensors 21, n.º 4 (23 de fevereiro de 2021): 1540. http://dx.doi.org/10.3390/s21041540.
Texto completo da fonteTassa, Tamir, Tal Grinshpoun e Roie Zivan. "Privacy Preserving Implementation of the Max-Sum Algorithm and its Variants". Journal of Artificial Intelligence Research 59 (17 de julho de 2017): 311–49. http://dx.doi.org/10.1613/jair.5504.
Texto completo da fonteKaji, Shizuo, Toshiaki Maeno, Koji Nuida e Yasuhide Numata. "Polynomial expressions of p-ary auction functions". Journal of Mathematical Cryptology 13, n.º 2 (1 de junho de 2019): 69–80. http://dx.doi.org/10.1515/jmc-2018-0016.
Texto completo da fonteWang, Ruyan, Shiqi Zhang, Zhigang Yang, Puning Zhang, Dapeng Wu, Yongling Lu e Alexander Fedotov. "Private Data Aggregation Based on Fog-Assisted Authentication for Mobile Crowd Sensing". Security and Communication Networks 2021 (22 de setembro de 2021): 1–12. http://dx.doi.org/10.1155/2021/7354316.
Texto completo da fonteBaum, Carsten, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl e Juan Ramón Troncoso-Pastoriza. "Efficient protocols for oblivious linear function evaluation from ring-LWE1". Journal of Computer Security 30, n.º 1 (20 de janeiro de 2022): 39–78. http://dx.doi.org/10.3233/jcs-200116.
Texto completo da fonteZhong, Jiayong, e Xiaofu Xiong. "Data Security Storage Method for Power Distribution Internet of Things in Cyber-Physical Energy Systems". Wireless Communications and Mobile Computing 2021 (2 de janeiro de 2021): 1–15. http://dx.doi.org/10.1155/2021/6694729.
Texto completo da fonteK Ravindranath, P. Raja Sekhar Reddy ,. "Enhancing Secure and Reliable Data Transfer through Robust Integrity". Journal of Electrical Systems 20, n.º 1s (28 de março de 2024): 900–910. http://dx.doi.org/10.52783/jes.841.
Texto completo da fonteWu, Yuncheng, Naili Xing, Gang Chen, Tien Tuan Anh Dinh, Zhaojing Luo, Beng Chin Ooi, Xiaokui Xiao e Meihui Zhang. "Falcon: A Privacy-Preserving and Interpretable Vertical Federated Learning System". Proceedings of the VLDB Endowment 16, n.º 10 (junho de 2023): 2471–84. http://dx.doi.org/10.14778/3603581.3603588.
Texto completo da fonteZhou, Jun, e Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme". Applied Mechanics and Materials 411-414 (setembro de 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.
Texto completo da fonteShah, Aayush, Prabhat Mahato e Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Texto completo da fontePotdukhe, Hitesh. "Exploratory Review: Decentralized Voting System Using Blockchain". International Journal for Research in Applied Science and Engineering Technology 9, n.º 11 (30 de novembro de 2021): 1082–86. http://dx.doi.org/10.22214/ijraset.2021.38948.
Texto completo da fonteZhang, En, Jie Peng e Ming Li. "Outsourcing secret sharing scheme based on homomorphism encryption". IET Information Security 12, n.º 1 (1 de janeiro de 2018): 94–99. http://dx.doi.org/10.1049/iet-ifs.2017.0026.
Texto completo da fonteSun, Qindong, Han Cao, Shancang Li, Houbing Song e Yanxiao Liu. "Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme". Mathematics 10, n.º 5 (24 de fevereiro de 2022): 710. http://dx.doi.org/10.3390/math10050710.
Texto completo da fonteMaivizhi, Radhakrishnan, e Palanichamy Yogesh. "Secure In-Network Aggregation in Wireless Sensor Networks". International Journal of Intelligent Information Technologies 16, n.º 1 (janeiro de 2020): 49–74. http://dx.doi.org/10.4018/ijiit.2020010104.
Texto completo da fonteHan, Yibo, Weiwei Zhang e Zheng Zhang. "Security Analysis of Intelligent System Based on Edge Computing". Security and Communication Networks 2021 (16 de agosto de 2021): 1–10. http://dx.doi.org/10.1155/2021/1224333.
Texto completo da fonteJafari, Amir, e Shahram Khazaei. "On Abelian and Homomorphic Secret Sharing Schemes". Journal of Cryptology 34, n.º 4 (22 de setembro de 2021). http://dx.doi.org/10.1007/s00145-021-09410-2.
Texto completo da fonte