A systematic review on the status and progress of homomorphic encryption technologies (English)
- New search for: Alloghani, Mohamed
- New search for: M. Alani, Mohammed
- Further information on M. Alani, Mohammed:
- https://orcid.org/0000-0002-4324-1774
- New search for: Al-Jumeily, Dhiya
- Further information on Al-Jumeily, Dhiya:
- https://orcid.org/0000-0002-9170-0568
- New search for: Baker, Thar
- Further information on Baker, Thar:
- https://orcid.org/0000-0002-5166-4873
- New search for: Mustafina, Jamila
- New search for: Hussain, Abir
- Further information on Hussain, Abir:
- https://orcid.org/0000-0001-8413-0045
- New search for: J. Aljaaf, Ahmed
- New search for: Alloghani, Mohamed
- New search for: M. Alani, Mohammed
- New search for: Al-Jumeily, Dhiya
- New search for: Baker, Thar
- New search for: Mustafina, Jamila
- New search for: Hussain, Abir
- New search for: J. Aljaaf, Ahmed
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:A systematic review on the status and progress of homomorphic encryption technologies
-
Contributors:Alloghani, Mohamed ( author ) / M. Alani, Mohammed ( author ) / Al-Jumeily, Dhiya ( author ) / Baker, Thar ( author ) / Mustafina, Jamila ( author ) / Hussain, Abir ( author ) / J. Aljaaf, Ahmed ( author )
-
Publisher:
-
Publication date:2019-07-22
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:Homomorphic encryption , Big data , Cloud computing , Big data security , Cloud computing security , Cloud computing challenges , CIA , Confidentiality, Integrity and Availability , ECC , Elliptic Curve Cryptography , FHE , Fully Homomorphic Encryption , HERS , Homomorphic Re-encryption Scheme , HE , Homomorphic Encryption , IoT , Internet of Things , IJARCS , International Journal of Advanced Research in Computer Science , PRISMA , Preferred Reporting Items for Systematic Reviews and Meta-Analyses , PPDP , Privacy Preserving Data Processing , RSA , Rivest-Shamir-Adelman encryption
-
Source:
Table of contents – Volume 48
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
Intrusion response prioritization based on fuzzy ELECTRE multiple criteria decision making techniqueSingh, Dileep Kumar / Kaushik, Praveen et al. | 2019
-
Kernel homomorphic encryption protocolUllah, Shamsher / Li, Xiang Yang / Hussain, Muhammad Tanveer / Lan, Zhang et al. | 2019
-
Sharing information online rationally: An observation of user privacy concerns and awareness using serious gameFatima, Rubia / Yasin, Affan / Liu, Lin / Wang, Jianmin / Afzal, Wasif / Yasin, Awaid et al. | 2019
-
Efficient privacy-preserving authentication framework for edge-assisted Internet of DronesTian, Yifan / Yuan, Jiawei / Song, Houbing et al. | 2019
-
A Cluster Correlation power analysis against double blinding exponentiationWan, Wunan / Chen, Jun / Zhang, Shibing / Xia, Jinyue et al. | 2019
-
Security analysis of third-party in-app payment in mobile applicationsYang, Wenbo / Li, Juanru / Zhang, Yuanyuan / Gu, Dawu et al. | 2019
-
Publisher Note| 2019
-
Editorial Board| 2019
-
Toward a secure video watermarking in compressed domainMansouri, Azadeh / Mahmoudi-Aznaveh, Ahmad et al. | 2019
-
Cognitive security: A comprehensive study of cognitive science in cybersecurityAndrade, Roberto O / Yoo, Sang Guun et al. | 2019
-
A robust domain partitioning intrusion detection methodMwitondi, Kassim S. / Said, Raed A. / Zargari, Shahrzad A. et al. | 2019
-
Human identification after plastic surgery using region based score level fusion of local facial featuresSabharwal, Tanupreet / Gupta, Rashmi et al. | 2019
-
Checking certificate revocation efficiently using certificate revocation guardHu, Qinwen / Asghar, Muhammad Rizwan / Brownlee, Nevil et al. | 2019
-
Reversible data hiding in homomorphically encrypted image using interpolation techniqueMalik, Asad / Wang, Hongxia / Chen, Tailong / Yang, Tianlong / Khan, Ahmad Neyaz / Wu, Hanzhou / Chen, Yanli / Hu, Yi et al. | 2019
-
A technique for DNA cryptography based on dynamic mechanismsBiswas, Md. Rafiul / Alam, Kazi Md. Rokibul / Tamura, Shinsuke / Morimoto, Yasuhiko et al. | 2019
-
Profile-guided code identification and hardening using return oriented programmingShrivastava, Rajesh Kumar / Hota, Chittaranjan et al. | 2019
-
A highly efficient and secure hardware implementation of the advanced encryption standardMasoumi, M. et al. | 2019
-
A prediction error based histogram association and mapping technique for data embedmentKamal, A.H.M. / Islam, Mohammad Mahfuzul et al. | 2019
-
Attributes revocation through ciphertext puncturationJia, Hongyong / Chen, Yue / Li, Yan / Yan, Xincheng / Liu, Fenlin / Luo, Xiangyang / Wang, Bo et al. | 2019
-
When an attacker meets a cipher-image in 2018: A year in reviewLi, Chengqing / Zhang, Yun / Xie, Eric Yong et al. | 2019
-
Discovering and utilising expert knowledge from security event logsKhan, Saad / Parkinson, Simon et al. | 2019
-
A systematic review on the status and progress of homomorphic encryption technologiesAlloghani, Mohamed / M. Alani, Mohammed / Al-Jumeily, Dhiya / Baker, Thar / Mustafina, Jamila / Hussain, Abir / J. Aljaaf, Ahmed et al. | 2019
-
Usable security for QR codeFocardi, Riccardo / Luccio, Flaminia L. / Wahsheh, Heider A.M. et al. | 2019
-
An effective comparison protocol over encrypted data in cloud computingJiang, Leqi / Cao, Yi / Yuan, Chengsheng / Sun, Xingming / Zhu, Xiaoli et al. | 2019
-
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysisNunes, Matthew / Burnap, Pete / Rana, Omer / Reinecke, Philipp / Lloyd, Kaelon et al. | 2019
-
Deriving ChaCha20 key streams from targeted memory analysisMcLaren, Peter / Buchanan, William J. / Russell, Gordon / Tan, Zhiyuan et al. | 2019
-
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static AssumptionsDatta, Pratish / Dutta, Ratna / Mukhopadhyay, Sourav et al. | 2019