Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artículo
|
A Survey on Homomorphic Encryption Schemes: Theory and ImplementationAcar, Abbas ; Aksu, Hidayet ; Uluagac, A. Selcuk ; Conti, MauroACM computing surveys, 2019-09, Vol.51 (4), p.1-35 [Revista revisada por pares]Baltimore: Association for Computing MachineryTexto completo disponible |
|
2 |
Material Type: Artículo
|
A Survey of Provably Secure Searchable EncryptionBösch, Christoph ; Hartel, Pieter ; Jonker, Willem ; Peter, AndreasACM computing surveys, 2015-01, Vol.47 (2), p.1-51 [Revista revisada por pares]Baltimore: Association for Computing MachineryTexto completo disponible |
|
3 |
Material Type: Artículo
|
Secure third‐party data clustering using SecureCL, Φ‐data and multi‐user order preserving encryptionAlmutairi, Nawal ; Coenen, Frans ; Dures, KeithExpert systems, 2021-11, Vol.38 (7), p.n/a [Revista revisada por pares]Oxford: Blackwell Publishing LtdTexto completo disponible |
|
4 |
Material Type: Artículo
|
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocationQian, Huiling ; Li, Jiguo ; Zhang, Yichen ; Han, JinguangInternational journal of information security, 2015-11, Vol.14 (6), p.487-497 [Revista revisada por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponible |
|
5 |
Material Type: Artículo
|
A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesLyu, Minzhao ; Gharakheili, Hassan Habibi ; Sivaraman, VijayACM computing surveys, 2023-08, Vol.55 (8), p.1-28 [Revista revisada por pares]Baltimore: Association for Computing MachineryTexto completo disponible |
|
6 |
Material Type: Artículo
|
Efficient searchable symmetric encryption supporting range queriesMolla, Eirini ; Rizomiliotis, Panagiotis ; Gritzalis, StefanosInternational journal of information security, 2023-08, Vol.22 (4), p.785-798 [Revista revisada por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponible |
|
7 |
Material Type: Artículo
|
Encryption Policies for Regulating Access to Outsourced DataDE CAPITANI DI VIMERCATI, Sabrina ; FORESTI, Sara ; JAJODIA, Sushil ; PARABOSCHI, Stefano ; SAMARATI, PierangelaACM transactions on database systems, 2010-04, Vol.35 (2), p.1-46 [Revista revisada por pares]New York, NY: Association for Computing MachineryTexto completo disponible |
|
8 |
Material Type: Artículo
|
A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future DirectionsYin, Xuefei ; Zhu, Yanming ; Hu, JiankunACM computing surveys, 2021-07, Vol.54 (6), p.1-36 [Revista revisada por pares]Baltimore: Association for Computing MachineryTexto completo disponible |
|
9 |
Material Type: Artículo
|
Two-stage data encryption using chaotic neural networksSrivastava, Gautam ; Vinoth Kumar, C.N.S. ; Kavitha, V. ; Parthiban, N. ; Venkataraman, Revathi Farouk, AhmedJournal of intelligent & fuzzy systems, 2020-01, Vol.38 (3), p.2561-2568 [Revista revisada por pares]Amsterdam: IOS Press BVTexto completo disponible |
|
10 |
Material Type: Artículo
|
A Survey on Searchable Symmetric EncryptionLi, Feng ; Ma, Jianfeng ; Miao, Yinbin ; Liu, Ximeng ; Ning, Jianting ; Deng, Robert H.ACM computing surveys, 2024-05, Vol.56 (5), p.1-42, Article 119 [Revista revisada por pares]New York, NY: ACMTexto completo disponible |