Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
A Survey on Homomorphic Encryption Schemes: Theory and ImplementationAcar, Abbas ; Aksu, Hidayet ; Uluagac, A. Selcuk ; Conti, MauroACM computing surveys, 2019-09, Vol.51 (4), p.1-35 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
A Survey of Provably Secure Searchable EncryptionBösch, Christoph ; Hartel, Pieter ; Jonker, Willem ; Peter, AndreasACM computing surveys, 2015-01, Vol.47 (2), p.1-51 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use caseKara, Mostefa ; Laouid, Abdelkader ; Yagoub, Mohammed Amine ; Euler, Reinhardt ; Medileh, Saci ; Hammoudeh, Mohammad ; Eleyan, Amna ; Bounceur, AhcèneExpert systems, 2022-06, Vol.39 (5), p.n/a [Periódico revisado por pares]Oxford: Blackwell Publishing LtdTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesLyu, Minzhao ; Gharakheili, Hassan Habibi ; Sivaraman, VijayACM computing surveys, 2023-08, Vol.55 (8), p.1-28 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Secure third‐party data clustering using SecureCL, Φ‐data and multi‐user order preserving encryptionAlmutairi, Nawal ; Coenen, Frans ; Dures, KeithExpert systems, 2021-11, Vol.38 (7), p.n/a [Periódico revisado por pares]Oxford: Blackwell Publishing LtdTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocationQian, Huiling ; Li, Jiguo ; Zhang, Yichen ; Han, JinguangInternational journal of information security, 2015-11, Vol.14 (6), p.487-497 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Efficient searchable symmetric encryption supporting range queriesMolla, Eirini ; Rizomiliotis, Panagiotis ; Gritzalis, StefanosInternational journal of information security, 2023-08, Vol.22 (4), p.785-798 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Encryption Policies for Regulating Access to Outsourced DataDE CAPITANI DI VIMERCATI, Sabrina ; FORESTI, Sara ; JAJODIA, Sushil ; PARABOSCHI, Stefano ; SAMARATI, PierangelaACM transactions on database systems, 2010-04, Vol.35 (2), p.1-46 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Searchable Symmetric Encryption: Designs and ChallengesPoh, Geong Sen ; Chin, Ji-Jian ; Yau, Wei-Chuen ; Choo, Kim-Kwang Raymond ; Mohamad, Moesfa SoeheilaACM computing surveys, 2018-09, Vol.50 (3), p.1-37 [Periódico revisado por pares]Baltimore: Association for Computing Machinery, IncTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future DirectionsYin, Xuefei ; Zhu, Yanming ; Hu, JiankunACM computing surveys, 2021-07, Vol.54 (6), p.1-36 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |