过去一年中添加的文章,按日期排序

Blockchain Technology and Emerging Applications: Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings

J Chen, Z Xia - 2024 - books.google.com
99 天前 - … Functional encryption (FE) is a multi-function cryptographic primitive that was first
… Within this phase, we introduce the notations and some pertinent cryptography that we …

Decentralized Multi-Client Functional Encryption for Inner Product with Applications to Federated Learning

X Qian, H Li, M Hao, G Xu, H Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
123 天前 - … In the initialization phase, we configure the cryptographic algorithms and
acquire the necessary public parameters. The aggregation phase conducts encryption and …

[图书][B] Guidebook for Radiography

PR Vaidya - 2024 - Springer
125 天前 - When the idea of preparing a guide book for radiography came, the first question
we asked ourselves was,‘why one more book’? Various agencies here and abroad have …

Privacy Preserving Based on Seamless Authentication with Provable Key Verification using mIoMT for B5G-enabled Healthcare Systems

BD Deebak, SO Hwang - IEEE Transactions on Services …, 2024 - ieeexplore.ieee.org
134 天前 - machine learning models like support vector machines (SVM) to monitor the features
relevant to physical and operational statistics [18]. To achieve service … the cryptographic

PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark

Z Hua, Y Tong, Y Zheng, Y Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
184 天前 - vectors, we build on a lightweight cryptographic technique, additive secret sharing
[29], to protect the training data and word vectors. … outsourced support vector machine design …

Deep Learning Enhanced Side Channel Analysis on CRYSTALS-Kyber

AT Hoang, M Kennaway, DT Pham… - … on Quality Electronic …, 2024 - ieeexplore.ieee.org
186 天前 - … attack on contemporary cryptographic mechanisms prompted … one or more Post
Quantum Cryptography (PQC) schemes [1]. … as the Support Vector Machine (SVM) have shown …

Empirical Analysis of The Privacy-Utility Trade-off of Classification Algorithms Under Differential Privacy

NMS Bari, H Imtiaz - 2023 26th International Conference on …, 2023 - ieeexplore.ieee.org
241 天前 - … DP definition is cryptographically motivated and mathematically rigorous, and it is
… , such as logistic regression, support vector machine, and neural network based classifiers, …

A Comparison of Cloud Security Mechanisms

D Saravanan, M Maragatharajan… - 2023 2nd …, 2023 - ieeexplore.ieee.org
243 天前 - … In this paper we will talk about several cryptography methods that will make cloud …
use methods like linear regression and support vector machine. But because of their stagnant …

[图书][B] Information Security: 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings

E Athanasopoulos, B Mennink - 2023 - books.google.com
254 天前 - … We also tried to balance the expertise between cryptography and … in cryptography,
and in particular in symmetric cryptography, key management, postquantum cryptography, …

[PDF][PDF] Computer and Information Sciences

A Kjamilji, OB Güney - Journal of King Saud University–Computer …, 2023 - researchgate.net
320 天前 - … Since the used underlying cryptographic primitives are shown to be resilient to
quantum computer attacks, the proposed algorithms are also suitable for the post-quantum world…