-
1FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption
المصدر: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. :183-191
مصطلحات موضوعية: Cryptography, Electronic data interchange, Network security, Block-chain, Encrypted data, Encryption schemes, Fairness, Functional encryptions, Multiinput, Performance, Plaintext, Research gaps, Verifiable decryption, Blockchain
وصف الملف: electronic
-
2Academic Journal
المصدر: Tongxin xuebao, Vol 45, Pp 50-65 (2024)
مصطلحات موضوعية: convolutional neural network, encrypted data, functional encryption, privacy protection, Telecommunication, TK5101-6720
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
3Conference
المؤلفون: Jabloun, Meryem, Panayides, Andreas, Ramdani, Nacim
المساهمون: Jabloun, Meryem, Panayides, Andreas, Ramdani, Nacim
المصدر: ITISE 2024 (10th International conference on Time Series and Forecasting), Gran Canaria
مصطلحات موضوعية: Data processing, encrypted data
Relation: https://zenodo.org/communities/respect-101007673; https://doi.org/10.5281/zenodo.11949566; https://doi.org/10.5281/zenodo.11949567; oai:zenodo.org:11949567
-
4Academic Journal
المؤلفون: Sara Jafarbeiki, Amin Sakzad, Ron Steinfeld, Shabnam Kasra Kermanshahi, Chandra Thapa, Yuki Kume
المصدر: Heliyon, Vol 10, Iss 8, Pp e29399- (2024)
مصطلحات موضوعية: Dynamic searchable encryption, Genomic data privacy, Secure outsourcing, Querying of encrypted data, Cloud security, Science (General), Q1-390, Social sciences (General), H1-99
وصف الملف: electronic resource
-
5Academic Journal
المؤلفون: Facchinetti, Dario, Paraboschi, Stefano, Rossi, Matthew
المساهمون: De Capitani di Vimercati, Sabrina, Facchinetti, Dario, Foresti, Sara, Oldani, Gianluca, Paraboschi, Stefano Giulio, Rossi, Matthew, Samarati, Pierangela
مصطلحات موضوعية: Cloud computing, Data outsourcing, efficient query execution, encrypted data, Encryption, Indexing, multi-dimensional index, Outsourcing, Protection, Server, Time-frequency analysis, Settore IINF-05/A - Sistemi di elaborazione delle informazioni
وصف الملف: remote
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:001308215700003; volume:12; issue:3; firstpage:1; lastpage:14; journal:IEEE TRANSACTIONS ON CLOUD COMPUTING; https://hdl.handle.net/10446/287762
-
6Academic Journal
المؤلفون: K, Praveen, K S, Gabriel Anand, Ghosh Ray, Indranil, Adhikari, Avishek, Datta, Sabyasachi, Biswas, Arnab Kumar
المصدر: K , P , K S , G A , Ghosh Ray , I , Adhikari , A , Datta , S & Biswas , A K 2024 , On the design of a searchable encryption protocol for keyword search using proactive secret sharing . in 2024 IEEE 20th International Conference on e-Science (e-Science): Proceedings . IEEE International Conference on e-Science (e-Science): Proceedings , IEEE Xplore , 2024 IEEE 20th International Conference on e-Science (e-Science) , Osaka , Japan , 16/09/2024 . https://doi.org/10.1109/e-Science62913.2024.10678696
مصطلحات موضوعية: searchable encryption protocol, searchable encryption, encrypted data, data
وصف الملف: application/pdf
Relation: urn:ISBN:9798350365627
-
7Academic Journal
المؤلفون: Dan Mitrea, Liana Toderean, Tudor Cioara, Ionut Anghel, Marcel Antal
المصدر: Heliyon, Vol 9, Iss 11, Pp e22357- (2023)
مصطلحات موضوعية: Blockchain, Privacy, Smart contracts, Encrypted data, P2P energy trading, Demand response, Science (General), Q1-390, Social sciences (General), H1-99
وصف الملف: electronic resource
-
8
المؤلفون: Farokhi, Farhad, Shames, Iman, Johansson, Karl H., 1967
المصدر: IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS. 5(4):311-320
مصطلحات موضوعية: cryptography, data privacy, vehicle routing, driver information systems, symbol manipulation, private routing, homomorphic encryption, secure communication, transportation services, queries, algebraic manipulation, plain data, encrypted data, security guarantees, semihomomorphic encryption method, privacy-aware ride-sharing, routing algorithms, Paillier encryption method, private communication
وصف الملف: print
-
9Academic Journal
المؤلفون: Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, Waleed Alsmary, Maazen Alsabaan
المصدر: IEEE Access, Vol 10, Pp 109894-109907 (2022)
مصطلحات موضوعية: Privacy-preservation, security, person localization, inner product over encrypted data, surveillance systems, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
10Academic Journal
المؤلفون: S. De Capitani di Vimercati, S. Foresti, P. Samarati
المساهمون: S. De Capitani di Vimercati, S. Foresti, P. Samarati
مصطلحات موضوعية: Cloud-based scenario, Data protection, Selective data sharing, Access confidentiality, Querying encrypted Data, Query integrity, Distributed query execution, Settore INF/01 - Informatica
Relation: volume:4; issue:5; firstpage:1; lastpage:21; numberofpages:21; journal:SN COMPUTER SCIENCE; https://hdl.handle.net/2434/975749; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85163130141
-
11Academic Journal
المصدر: Entropy; Volume 25; Issue 3; Pages: 397
مصطلحات موضوعية: encrypted data detection, data entropy
وصف الملف: application/pdf
Relation: https://dx.doi.org/10.3390/e25030397
الاتاحة: https://doi.org/10.3390/e25030397
-
12Academic Journal
المؤلفون: Xiaopei Yang, Yu Zhang, Yifan Wang, Yin Li
المصدر: Information, Vol 14, Iss 12, p 643 (2023)
مصطلحات موضوعية: searchable symmetric encryption, electronic medical record, keyword search, range search, search over encrypted data, Information technology, T58.5-58.64
Relation: https://www.mdpi.com/2078-2489/14/12/643; https://doaj.org/toc/2078-2489; https://doaj.org/article/11bba850ef2245579c97e47734d8802e
-
13Academic Journal
المؤلفون: Amardeep Singh, Zohaib Mushtaq, Hamad Ali Abosaq, Salim Nasar Faraj Mursal, Muhammad Irfan, Grzegorz Nowakowski
المصدر: Electronics, Vol 12, Iss 3899, p 3899 (2023)
مصطلحات موضوعية: ransomware attack detection, transfer learning, deep learning ensemble models, cloud-encrypted data, cybersecurity, Electronics, TK7800-8360
Relation: https://www.mdpi.com/2079-9292/12/18/3899; https://doaj.org/toc/2079-9292; https://doaj.org/article/2b81e637de2d450c80a2017438f592b2
-
14Conference
المؤلفون: Madi, Abbass, Stan, Oana, Sirdey, Renaud, Gouy-Pailler, Cedric
المساهمون: Laboratoire pour la Confiance des sYstèmes de calcuL (LCYL), Université Paris-Saclay-Département Systèmes et Circuits Intégrés Numériques (DSCIN (CEA, LIST)), Laboratoire d'Intégration des Systèmes et des Technologies (LIST (CEA)), Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Laboratoire d'Intégration des Systèmes et des Technologies (LIST (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA), Intelligence Artificielle et Apprentissage Automatique (CEA, LIST) (LI3A (CEA, LIST)), Département Métrologie Instrumentation & Information (CEA, LIST) (DM2I (CEA, LIST)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Université Paris-Saclay-Laboratoire d'Intégration des Systèmes et des Technologies (LIST (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Université Paris-Saclay
المصدر: Proceedings of ICISSP - Proceedings of the 8th International Conference on Information Systems Security and Privacy ; ICISSP 2022 - the 8th International Conference on Information Systems Security and Privacy ; https://cea.hal.science/cea-04470272 ; ICISSP 2022 - the 8th International Conference on Information Systems Security and Privacy, Feb 2022, Virtual, France. pp.220-229, ⟨10.5220/0010987700003120⟩ ; https://www.scitepress.org/Link.aspx?doi=10.5220/0010987700003120
مصطلحات موضوعية: Artificial intelligence, machine learning, encrypted data, Trustworthy Artificial intelligence, classification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [STAT.ML]Statistics [stat]/Machine Learning [stat.ML]
-
15
-
16Academic Journal
المؤلفون: Haoran Zong, Hai Huang, Shufang Wang
المصدر: IEEE Access, Vol 9, Pp 22651-22661 (2021)
مصطلحات موضوعية: Secure outsourced computation, matrix determinant, computation over encrypted data, fully homomorphic encryption, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
17Academic Journal
المؤلفون: Qing Li, Yonghui Ju, Chang Zhao, Xintai He
المصدر: IEEE Access, Vol 9, Pp 42947-42958 (2021)
مصطلحات موضوعية: Convolutional neural networks, discrete sequential protocol data, derivative of discrete sequence, encrypted data classification, encryption probability sequence, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
18Conference
المؤلفون: Stippel, Lukas, Camal, Simon, Kariniotakis, Georges
المساهمون: Centre Procédés, Énergies Renouvelables, Systèmes Énergétiques (PERSEE), Mines Paris - PSL (École nationale supérieure des mines de Paris), Université Paris Sciences et Lettres (PSL)-Université Paris Sciences et Lettres (PSL), ANR-22-PETA-0004,AI-NRGY,Distributed AI-based architecture of future energy systems integrating very large amounts of distributed sources(2022)
المصدر: 44th International Symposium on Forecasting
https://hal.science/hal-04637097
44th International Symposium on Forecasting, Jun 2024, Dijon, Franceمصطلحات موضوعية: Renewable Energy Sources, Federated learning, Encrypted Data, Artificial intelligence, Privacy-preserving data sharing, Smart grid, [INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]
Relation: hal-04637097; https://hal.science/hal-04637097
الاتاحة: https://hal.science/hal-04637097
-
19Academic Journal
المؤلفون: N. Mainardi, A. Barenghi, G. Pelosi
المساهمون: Mainardi, N., Barenghi, A., Pelosi, G.
مصطلحات موضوعية: Security and privacy, Privacy-preserving protocols, Management and querying of encrypted data, Security protocols, Secure substring search, Cryptography, Homomorphic encryption, Privacy-preserving protocol
وصف الملف: ELETTRONICO
Relation: volume:3; issue:1; firstpage:1; lastpage:38; numberofpages:38; journal:DIGITAL THREATS; info:eu-repo/grantAgreement/EC/H2020/826232; http://hdl.handle.net/11311/1180993; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85126163810; https://doi.org/10.1145/3462333
-
20Academic Journal
المصدر: Symmetry; Volume 14; Issue 5; Pages: 1029
مصطلحات موضوعية: searchable symmetric encryption, searchable encryption, keyword search, ranked search, search over encrypted data
وصف الملف: application/pdf
Relation: Computer Science and Symmetry/Asymmetry; https://dx.doi.org/10.3390/sym14051029
الاتاحة: https://doi.org/10.3390/sym14051029