Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications (English)
- New search for: Hariss, Khalil
- New search for: Noura, Hassan
- New search for: Samhat, Abed Ellatif
- New search for: Hariss, Khalil
- New search for: Noura, Hassan
- New search for: Samhat, Abed Ellatif
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications
-
Contributors:
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2017-02-02
-
Size:10 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 34
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Human-centred cyber securityRenaud, Karen / Flowerday, Stephen et al. | 2017
- 2
-
Risk media and the end of anonymityHoskins, Andrew et al. | 2017
- 8
-
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisionsGerber, Paul / Volkamer, Melanie / Renaud, Karen et al. | 2016
- 27
-
Signalling over-privileged mobile applications using passive security indicatorsLo Iacono, Luigi / Gorski, Peter Leo / Grosse, Josephine / Gruschka, Nils et al. | 2016
- 34
-
Psychological needs as motivators for security and privacy actions on smartphonesKraus, Lydia / Wechsung, Ina / Möller, Sebastian et al. | 2016
- 46
-
Exploring behavioral information security networks in an organizational context: An empirical case studyDang-Pham, Duy / Pittayachawan, Siddhi / Bruno, Vince et al. | 2016
- 63
-
Access control for secure information sharing in smart content spacesGreaves, Brian / Coetzee, Marijke et al. | 2016
- 76
-
Contemplating human-centred security & privacy research: Suggesting future directionsRenaud, Karen / Flowerday, Stephen et al. | 2017
- 83
-
Publisher's Note: Article Based Publishing| 2017
- 84
-
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementationEmura, Keita / Kanaoka, Akira / Ohta, Satoshi / Takahashi, Takeshi et al. | 2016
- 92
-
A comprehensive view on quantity based aggregation for cadastral databasesAl Khalil, Firas / Gabillon, Alban / Capolsini, Patrick et al. | 2016
- 108
-
Communication security and privacy support in 6LoWPANWang, Xiaonan / Mu, Yi et al. | 2017
- 120
-
A structured methodology for deploying log management in WANsAnastopoulos, Vasileios / Katsikas, Sokratis et al. | 2017
- 133
-
An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networksTai, Wei-Liang / Chang, Ya-Fen / Li, Wei-Han et al. | 2017
- 142
-
A new transform domain steganography based on modified logistic chaotic map for color imagesValandar, Milad Yousefi / Ayubi, Peyman / Barani, Milad Jafari et al. | 2017
- 152
-
Introduction to the special issue of the journal of information security and applications on “ICS & SCADA cyber security”Jones, Kevin / Janicke, Helge / Facchi, Christian / Maglaras, Leandros et al. | 2017
- 153
-
Detection of attacks based on known vulnerabilities in industrial networked systemsCheminod, Manuel / Durante, Luca / Seno, Lucia / Valenzano, Adriano et al. | 2016
- 166
-
A collaborative cyber incident management system for European interconnected critical infrastructuresSettanni, Giuseppe / Skopik, Florian / Shovgenya, Yegor / Fiedler, Roman / Carolan, Mark / Conroy, Damien / Boettinger, Konstantin / Gall, Mark / Brost, Gerd / Ponchel, Christophe et al. | 2016
- 183
-
STPA-SafeSec: Safety and security analysis for cyber-physical systemsFriedberg, Ivo / McLaughlin, Kieran / Smith, Paul / Laverty, David / Sezer, Sakir et al. | 2016
- 197
-
A security evaluation of IEC 62351Schlegel, Roman / Obermeier, Sebastian / Schneider, Johannes et al. | 2016
- 205
-
Special issue on Secure Computation on Encrypted DataChen, Jiageng / He, Debiao / Su, Chunhua / Xia, Zhe et al. | 2017
- 207
-
Secure numerical and logical multi party operationsSchneider, Johannes / Lu, Bin et al. | 2017
- 218
-
Lightweight adaptive Random-Forest for IoT rule generation and executionDomb, Menachem / Bonchek-Dokow, Elisheva / Leshem, Guy et al. | 2017
- 225
-
Generalised regenerating codes for securing distributed storage systems against eavesdroppingXu, Jian / Cao, Yewen / Wang, Deqiang et al. | 2017
- 233
-
Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applicationsHariss, Khalil / Noura, Hassan / Samhat, Abed Ellatif et al. | 2017
- 243
-
Securing digital voice communication using non-autonomous modulated chaotic signalElzaher, Mahmoud F. Abd / Shalaby, Mohamed / Kamal, Yasser / Ramly, Salwa El et al. | 2017
- 251
-
Realizing correlated equilibrium by secure computationQiu, Lirong / Sun, Xin / Zhao, Xishun et al. | 2017
- 255
-
A lightweight biometrics based remote user authentication scheme for IoT servicesDhillon, Parwinder Kaur / Kalra, Sheetal et al. | 2017
- 271
-
Secure pseudonymisation for privacy-preserving probabilistic record linkageSmith, D. et al. | 2017
- 280
-
Toward single-server private information retrieval protocol via learning with errorsLi, Zengpeng / Ma, Chunguang / Wang, Ding / Du, Gang et al. | 2016