Search Results - Computing on Encrypted Data
-
1
Authors: Srinivasa Rao Challa
Source: The Digital Future of Finance and Wealth Management with Data and Intelligence ISBN: 9789349910980
-
2
Authors:
Source: IEEE Transactions on Computers. 73:2335-2349
-
3
-
4
Authors: Nigel Smart
Source: IEEE Security & Privacy. 21:94-98
-
5
Authors: et al.
Source: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 1 (2022)
Subject Terms: FOS: Computer and information sciences, Computer engineering. Computer hardware, Computer Science - Cryptography and Security, CKKS, Information technology, 02 engineering and technology, Hardware Accelerator, T58.5-58.64, 01 natural sciences, TK7885-7895, Hardware Architecture (cs.AR), 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, Homomorphic Encryption, Computer Science - Hardware Architecture, Cryptography and Security (cs.CR), Flexible
-
6
Authors: Carol, I.
Source: Cuestiones de Fisioterapia; 2025, Vol. 54 Issue 3, p2825-2844, 20p
-
7
Authors: Hao Bao
Source: Frontiers in Computing and Intelligent Systems. 2:1-3
-
8
Authors:
Source: Journal of Cryptology. 36
Subject Terms: 4613 Theory of computation, Technology, 4604 Cybersecurity and privacy, Science & Technology, 0103 Numerical and Computational Mathematics, Mathematics, Applied, 0804 Data Format, Engineering, Electrical & Electronic, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, 0101 Pure Mathematics, Computation Theory & Mathematics, Engineering, Computer Science, Theory & Methods, Physical Sciences, Computer Science, 0202 electrical engineering, electronic engineering, information engineering, Mathematics
-
9
Authors: et al.
Source: Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems. :1295-1309
Subject Terms: Performance (cs.PF), FOS: Computer and information sciences, Computer Science - Cryptography and Security, Computer Science - Performance, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Hardware Architecture (cs.AR), 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Computer Science - Hardware Architecture, Cryptography and Security (cs.CR)
-
10
Authors: Ulf Mattsson
Source: Controlling Privacy and the Use of Data Assets ISBN: 9781003189664
-
11
Authors: Ricci, Sara
Contributors: University/Department: Universitat Rovira i Virgili. Departament d'Enginyeria Informàtica i Matemàtiques
Thesis Advisors: Domingo-Ferrer, Josep, Soria Comas, Jorge
Source: TDX (Tesis Doctorals en Xarxa)
Subject Terms: divisió de dades, computació en núvol, evaluació de riscos-utilitat, división de datos, computación en la nube, evaluación de riesgos-utilidad, data splitting, cloud computing, risk-utility assessment, Ciències
File Description: application/pdf
Access URL: http://hdl.handle.net/10803/586261
-
12
Authors: Fischer, Andreas
Index Terms: Text, Thesis, Hochschulschrift, DoctoralThesis
-
13
-
14
Authors:
Source: Telecommunication Systems. 70:193-229
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
15
Authors: et al.
Contributors: et al.
Source: 2019 IEEE International Symposium on High Performance Computer Architecture (HPCA)
Subject Terms: Technology, Computer and information sciences, Science & Technology, polynomial multiplication, homomorphic encryption, latticebased cryptography, domain specific accelerator, 02 engineering and technology, 01 natural sciences, privacy in cloud computing, Computer Science, 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, Computer Science, Hardware & Architecture, hardware accelerator, FV homomorphic encryption, number theoretic transform
File Description: application/pdf
Access URL: http://pure-oai.bham.ac.uk/ws/files/67768682/FPGA_based_High_Performance.pdf
https://dblp.uni-trier.de/db/conf/hpca/hpca2019.html#RoyT0VV19
https://lirias.kuleuven.be/handle/123456789/646823
https://lirias.kuleuven.be/handle/20.500.12942/734050
https://doi.org/10.1109/hpca.2019.00052
http://hdl.handle.net/10138/308152 -
16
Authors: Čepaitė, Ieva
Subject Terms: 0301 basic medicine, FOS: Computer and information sciences, Quantum Physics, 03 medical and health sciences, Computer Science - Cryptography and Security, FOS: Physical sciences, 0102 computer and information sciences, Quantum Physics (quant-ph), 01 natural sciences, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2212.12953
-
17
Authors: Veugen, P.J.M. (Thijs)
Source: International Journal of Applied Cryptography vol. 4 no. 1, pp. 1-15
-
18
Authors:
Source: 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton). :1116-1122
Subject Terms: 0209 industrial biotechnology, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Access URL: https://nyuscholars.nyu.edu/en/publications/distributed-
computing -over-encrypted -data
https://dblp.uni-trier.de/db/conf/allerton/allerton2016.html#FrerisP16
https://ieeexplore.ieee.org/document/7852360/ -
19
Authors:
Source: IACR Transactions on Symmetric Cryptology, Pp 294-324 (2017)
IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 3; 294-324
Transactions on Symmetric CryptologySubject Terms: TK7885-7895, Computer engineering. Computer hardware, Modes-of-Operation, Modes-of-operation, Multi-Party Computation, Multi-party computation, 14. Life underwater, 0102 computer and information sciences, 16. Peace & justice, 01 natural sciences
File Description: application/pdf
-
20
Authors:
Source: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030190859
Nájsť tento článok vo Web of Science
Full Text Finder