Privacy enhancing technologies in the Internet of Things: Perspectives and challenges

SC Cha, TY Hsu, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices have brought much efficiency and convenience to our daily
life. However, the devices may collect a myriad of data from people without their consent …

Compressive sensing of medical images with confidentially homomorphic aggregations

L Wang, L Li, J Li, J Li, BB Gupta… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Efficient medical image sampling and transferring becomes one of key research areas in
computer science and healthcare application industries. In particular, the technique of body …

Homomorphic encryption and network coding in iot architectures: Advantages and future challenges

G Peralta, RG Cid-Fuentes, J Bilbao, PM Crespo - Electronics, 2019 - mdpi.com
The introduction of the Internet of Things (IoT) is creating manifold new services and
opportunities. This new technological trend enables the connection of a massive number of …

Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial

M Zhao, C Hu, X Song, C Zhao - Journal of Network and Computer …, 2019 - Elsevier
Cloud computing provides the clients with diversified services in a flexible manner. Recently,
the cloud platforms have been the basic underling-support for The IoT and mobile …

全同态加密文献计量分析研究.

陈智罡, 宋新霞, 郑梦策… - Journal of Computer …, 2022 - search.ebscohost.com
全同态加密在不解密的情况下, 能够对密文数据进行任意处理. 这种特殊的性质能够立竿见影地
解决数据隐私安全问题. 目前全同态加密已经成为学术界, 工业界乃至商业界的热门话题 …

Primitives towards verifiable computation: a survey

H Ahmad, L Wang, H Hong, J Li, H Dawood… - Frontiers of Computer …, 2018 - Springer
Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted
by the concept of third party computation. In more explicate terms, VC allows resource …

Lattice-based cryptography: A quantum approach to secure the iot technology

M Kachurova, T Shuminoski… - … against Hybrid Threats, 2022 - ebooks.iospress.nl
The security of the Internet of Things (IoT) is a key worry since it deals with personal data
that must be dependable and can be used dangerously to control and manipulate device …

[PDF][PDF] Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis

Z Zaman, W Xue, P Gauravaram, W Hu, SK Jha - Authorea Preprints, 2023 - techrxiv.org
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis Page 1 P osted on 7 Sep
2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.24083118.v1 — e-Prin ts p osted on T …

An application of homomorphic encryption on IoT based green house

S Makwana - … on Energy, Communication, Data Analytics and …, 2017 - ieeexplore.ieee.org
Every system must have some security if it would be used as commercial product. In the era
of Internet of Things, many systems are developed but most of them failed in term of …

M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system

T Do, S Park, J Lee, S Park - International Journal of …, 2019 - journals.sagepub.com
Recently, cyber-physical system is widely used for smart system control in various fields.
Various functions of the cyber-physical system must overcome the limited hardware …