Privacy-preserving multikey computing framework for encrypted data in the cloud
暂无分享,去创建一个
Zoe Lin Jiang | Jun Zhang | Ping Li | Siu Ming Yiu | S. Yiu | Jun Zhang | Z. L. Jiang | Ping Li
[1] Michael Naehrig,et al. Manual for Using Homomorphic Encryption for Bioinformatics , 2017, Proceedings of the IEEE.
[2] Foundations of Cryptography: Frontmatter , 2004 .
[3] Yongsoo Song,et al. Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference , 2019, IACR Cryptol. ePrint Arch..
[4] Meikang Qiu,et al. Cloud Infrastructure Resource Allocation for Big Data Applications , 2018, IEEE Transactions on Big Data.
[5] Lucian Mihai Itu,et al. Applying Deep Neural Networks over Homomorphic Encrypted Medical Data , 2020, Comput. Math. Methods Medicine.
[6] Ximeng Liu,et al. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.
[7] Siu-Ming Yiu,et al. Privacy-preserving verifiable elastic net among multiple institutions in the cloud , 2018, J. Comput. Secur..
[8] Baocang Wang,et al. Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing , 2020, Secur. Commun. Networks.
[9] Meikang Qiu,et al. A Case Study of Sensor Data Collection and Analysis in Smart City: Provenance in Smart Food Supply Chain , 2013, Int. J. Distributed Sens. Networks.
[10] Meikang Qiu,et al. Who Moved My Data? Privacy Protection in Smartphones , 2017, IEEE Communications Magazine.
[11] Dario Fiore,et al. Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data , 2015, CCS.
[12] Shen Su,et al. Block-DEF: A secure digital evidence framework using blockchain , 2019, Inf. Sci..
[13] Ming-Syan Chen,et al. Secure support vector machines outsourcing with random linear transformation , 2014, Knowledge and Information Systems.
[14] Ming Li,et al. A tale of two clouds: Computing on data encrypted under multiple keys , 2014, 2014 IEEE Conference on Communications and Network Security.
[15] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[16] Zhihui Lu,et al. All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives , 2019, Inf. Sci..
[17] Laurence T. Yang,et al. A survey on deep learning for big data , 2018, Inf. Fusion.
[18] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[19] Siu-Ming Yiu,et al. Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery , 2017, DBSec.
[20] Mei-Ling Shyu,et al. A Survey on Deep Learning , 2018, ACM Comput. Surv..
[21] Meikang Qiu,et al. Public Vehicles for Future Urban Transportation , 2016, IEEE Transactions on Intelligent Transportation Systems.
[22] Jian Liu,et al. Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys , 2017, J. Inf. Sci. Eng..
[23] Kim-Kwang Raymond Choo,et al. Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases , 2017, J. Comput. Syst. Sci..
[24] Peter Rindal,et al. ABY3: A Mixed Protocol Framework for Machine Learning , 2018, IACR Cryptol. ePrint Arch..
[25] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[26] Keke Gai,et al. Intelligent cryptography approach for secure distributed big data storage in cloud computing , 2017, Inf. Sci..
[27] Stefan Katzenbeisser,et al. Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.
[28] Philip S. Yu,et al. Differentially Private Data Publishing and Analysis: A Survey , 2017, IEEE Transactions on Knowledge and Data Engineering.
[29] Kim-Kwang Raymond Choo,et al. Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases , 2016, IEEE Transactions on Information Forensics and Security.
[30] Meikang Qiu,et al. Enabling Cloud Computing in Emergency Management Systems , 2014, IEEE Cloud Computing.
[31] Chen Li,et al. Comments on “An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys” , 2018, IEEE Transactions on Information Forensics and Security.
[32] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[33] Qiang Yang,et al. Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..
[34] Meikang Qiu,et al. An Empirical Study of Web Interface Design on Small Display Devices , 2004, IEEE/WIC/ACM International Conference on Web Intelligence (WI'04).
[35] Meikang Qiu,et al. Jamming ACK Attack to Wireless Networks and a Mitigation Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.