A systematic review on the status and progress of homomorphic encryption technologies (Englisch)
- Neue Suche nach: Alloghani, Mohamed
- Neue Suche nach: M. Alani, Mohammed
- Weitere Informationen zu M. Alani, Mohammed:
- https://orcid.org/0000-0002-4324-1774
- Neue Suche nach: Al-Jumeily, Dhiya
- Weitere Informationen zu Al-Jumeily, Dhiya:
- https://orcid.org/0000-0002-9170-0568
- Neue Suche nach: Baker, Thar
- Weitere Informationen zu Baker, Thar:
- https://orcid.org/0000-0002-5166-4873
- Neue Suche nach: Mustafina, Jamila
- Neue Suche nach: Hussain, Abir
- Weitere Informationen zu Hussain, Abir:
- https://orcid.org/0000-0001-8413-0045
- Neue Suche nach: J. Aljaaf, Ahmed
- Neue Suche nach: Alloghani, Mohamed
- Neue Suche nach: M. Alani, Mohammed
- Neue Suche nach: Al-Jumeily, Dhiya
- Neue Suche nach: Baker, Thar
- Neue Suche nach: Mustafina, Jamila
- Neue Suche nach: Hussain, Abir
- Neue Suche nach: J. Aljaaf, Ahmed
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:A systematic review on the status and progress of homomorphic encryption technologies
-
Beteiligte:Alloghani, Mohamed ( Autor:in ) / M. Alani, Mohammed ( Autor:in ) / Al-Jumeily, Dhiya ( Autor:in ) / Baker, Thar ( Autor:in ) / Mustafina, Jamila ( Autor:in ) / Hussain, Abir ( Autor:in ) / J. Aljaaf, Ahmed ( Autor:in )
-
Verlag:
-
Erscheinungsdatum:22.07.2019
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:Homomorphic encryption , Big data , Cloud computing , Big data security , Cloud computing security , Cloud computing challenges , CIA , Confidentiality, Integrity and Availability , ECC , Elliptic Curve Cryptography , FHE , Fully Homomorphic Encryption , HERS , Homomorphic Re-encryption Scheme , HE , Homomorphic Encryption , IoT , Internet of Things , IJARCS , International Journal of Advanced Research in Computer Science , PRISMA , Preferred Reporting Items for Systematic Reviews and Meta-Analyses , PPDP , Privacy Preserving Data Processing , RSA , Rivest-Shamir-Adelman encryption
-
Datenquelle:
Inhaltsverzeichnis – Band 48
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
Profile-guided code identification and hardening using return oriented programmingShrivastava, Rajesh Kumar / Hota, Chittaranjan et al. | 2019
-
A highly efficient and secure hardware implementation of the advanced encryption standardMasoumi, M. et al. | 2019
-
A prediction error based histogram association and mapping technique for data embedmentKamal, A.H.M. / Islam, Mohammad Mahfuzul et al. | 2019
-
Attributes revocation through ciphertext puncturationJia, Hongyong / Chen, Yue / Li, Yan / Yan, Xincheng / Liu, Fenlin / Luo, Xiangyang / Wang, Bo et al. | 2019
-
When an attacker meets a cipher-image in 2018: A year in reviewLi, Chengqing / Zhang, Yun / Xie, Eric Yong et al. | 2019
-
Discovering and utilising expert knowledge from security event logsKhan, Saad / Parkinson, Simon et al. | 2019
-
A technique for DNA cryptography based on dynamic mechanismsBiswas, Md. Rafiul / Alam, Kazi Md. Rokibul / Tamura, Shinsuke / Morimoto, Yasuhiko et al. | 2019
-
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysisNunes, Matthew / Burnap, Pete / Rana, Omer / Reinecke, Philipp / Lloyd, Kaelon et al. | 2019
-
Deriving ChaCha20 key streams from targeted memory analysisMcLaren, Peter / Buchanan, William J. / Russell, Gordon / Tan, Zhiyuan et al. | 2019
-
Publisher Note| 2019
-
Editorial Board| 2019
-
A robust domain partitioning intrusion detection methodMwitondi, Kassim S. / Said, Raed A. / Zargari, Shahrzad A. et al. | 2019
-
Human identification after plastic surgery using region based score level fusion of local facial featuresSabharwal, Tanupreet / Gupta, Rashmi et al. | 2019
-
Checking certificate revocation efficiently using certificate revocation guardHu, Qinwen / Asghar, Muhammad Rizwan / Brownlee, Nevil et al. | 2019
-
Reversible data hiding in homomorphically encrypted image using interpolation techniqueMalik, Asad / Wang, Hongxia / Chen, Tailong / Yang, Tianlong / Khan, Ahmad Neyaz / Wu, Hanzhou / Chen, Yanli / Hu, Yi et al. | 2019
-
Toward a secure video watermarking in compressed domainMansouri, Azadeh / Mahmoudi-Aznaveh, Ahmad et al. | 2019
-
A systematic review on the status and progress of homomorphic encryption technologiesAlloghani, Mohamed / M. Alani, Mohammed / Al-Jumeily, Dhiya / Baker, Thar / Mustafina, Jamila / Hussain, Abir / J. Aljaaf, Ahmed et al. | 2019
-
Sharing information online rationally: An observation of user privacy concerns and awareness using serious gameFatima, Rubia / Yasin, Affan / Liu, Lin / Wang, Jianmin / Afzal, Wasif / Yasin, Awaid et al. | 2019
-
Efficient privacy-preserving authentication framework for edge-assisted Internet of DronesTian, Yifan / Yuan, Jiawei / Song, Houbing et al. | 2019
-
A Cluster Correlation power analysis against double blinding exponentiationWan, Wunan / Chen, Jun / Zhang, Shibing / Xia, Jinyue et al. | 2019
-
Security analysis of third-party in-app payment in mobile applicationsYang, Wenbo / Li, Juanru / Zhang, Yuanyuan / Gu, Dawu et al. | 2019
-
Intrusion response prioritization based on fuzzy ELECTRE multiple criteria decision making techniqueSingh, Dileep Kumar / Kaushik, Praveen et al. | 2019
-
Kernel homomorphic encryption protocolUllah, Shamsher / Li, Xiang Yang / Hussain, Muhammad Tanveer / Lan, Zhang et al. | 2019
-
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static AssumptionsDatta, Pratish / Dutta, Ratna / Mukhopadhyay, Sourav et al. | 2019
-
Usable security for QR codeFocardi, Riccardo / Luccio, Flaminia L. / Wahsheh, Heider A.M. et al. | 2019
-
An effective comparison protocol over encrypted data in cloud computingJiang, Leqi / Cao, Yi / Yuan, Chengsheng / Sun, Xingming / Zhu, Xiaoli et al. | 2019
-
Cognitive security: A comprehensive study of cognitive science in cybersecurityAndrade, Roberto O / Yoo, Sang Guun et al. | 2019