Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Privacy‐preserving federated learning based on multi‐key homomorphic encryptionMa, Jing ; Naas, Si‐Ahmed ; Sigg, Stephan ; Lyu, XixiangInternational journal of intelligent systems, 2022-09, Vol.37 (9), p.5880-5901 [Periódico revisado por pares]New York: Hindawi LimitedTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data HealthcareRashmi, P. ; Supriya, M. C. ; Hua, Qiaozhi Chakraborty, Chinmay ; Chinmay ChakrabortySecurity and communication networks, 2022-02, Vol.2022, p.1-9 [Periódico revisado por pares]London: HindawiTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryptionJia, Haixin ; Aldeen, Mohammed S. ; Zhao, Chuan ; Jing, Shan ; Chen, ZhenxiangInternational journal of intelligent systems, 2022-11, Vol.37 (11), p.9173-9191 [Periódico revisado por pares]New York: Hindawi LimitedTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Computer Network Security Management of Data Encryption TechnologySun, Caiping ; Wang, Weijiang Hashmi, Mohammad Farukh ; Mohammad Farukh HashmiWireless communications and mobile computing, 2022-09, Vol.2022, p.1-9 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Image Encryption with Double Spiral Scans and Chaotic MapsTang, Zhenjun ; Yang, Ye ; Xu, Shijie ; Yu, Chunqiang ; Zhang, Xianquan Del Rey, Angel M. ; Angel M Del ReySecurity and communication networks, 2019-01, Vol.2019, p.1-15 [Periódico revisado por pares]London: HindawiTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
IIBE: An Improved Identity-Based Encryption Algorithm for WSN SecurityCao, ChunHua ; Tang, YaNa ; Huang, DeYan ; Gan, WeiMin ; Zhang, Chunjiong Su, Jian ; Jian SuSecurity and communication networks, 2021, Vol.2021, p.1-8 [Periódico revisado por pares]London: HindawiTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Application Research of Data Encryption Algorithm in Computer Security ManagementGong, Qianru Nagaraj, Balakrishnan ; Balakrishnan NagarajWireless communications and mobile computing, 2022-07, Vol.2022, p.1-7 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryptionXu, Guangxia ; Zhang, Jiajun ; Cliff, Uchani Gutierrez Omar ; Ma, ChuangInternational journal of intelligent systems, 2022-12, Vol.37 (12), p.10715-10750 [Periódico revisado por pares]New York: Hindawi LimitedTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Practical wildcard searchable encryption with tree‐based indexZhang, Xi ; Zhao, Bo ; Qin, Jing ; Hou, Wei ; Su, Ye ; Yang, HainingInternational journal of intelligent systems, 2021-12, Vol.36 (12), p.7475-7499 [Periódico revisado por pares]New York: Hindawi LimitedTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Encryption Technology for Computer Network Data Security ProtectionYu, Yang Venkatesan, C. ; C VenkatesanSecurity and communication networks, 2022-08, Vol.2022, p.1-9 [Periódico revisado por pares]London: HindawiTexto completo disponível |