[PDF][PDF] Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography.

B Murugeshwari, D Selvaraj… - … Automation & Soft …, 2023 - cdn.techscience.cn
Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique
that protects the privacy of individual data while mining those data. The most significant task …

An entropy-view secure multiparty computation protocol based on semi-honest model

Y Luo, Y Chen, T Li, Y Wang, Y Yang… - Journal of Organizational …, 2022 - igi-global.com
Data interaction scenarios involving multiple parties in network communities have problems
of trust, data security, and reliability of the parties, and secure multiparty computation …

Blockchain-based system and methods for sensitive data transactions

X Su, I Ullah, M Wang, C Choi - IEEE Consumer Electronics …, 2021 - ieeexplore.ieee.org
A blockchain-based processing framework for sensitive data is proposed. The smart network
comprises a blockchain module, an electronic contract (E-contract) layer node, and a …

An efficient private set intersection protocol for the cloud computing environments

O Ruan, X Huang, H Mao - 2020 IEEE 6th Intl Conference on …, 2020 - ieeexplore.ieee.org
Private set intersection (PSI) is a hot topic in cryptography and has a wide range of
applications such as privacy preserving personal properties matching and data mining …

Forensic verification of handwritten documents using secure multi party computation

RR Subramanian, H Mohan… - … on Advancements in …, 2021 - ieeexplore.ieee.org
The recent advance in the use of image processing techniques has benefitted many areas
including forensic and digital verification in cybercrime detection. Image processing …

Data distribution and secure data transmission using IANFIS and MECC in IoT

BM Pampapathi, M Nageswara Guptha… - Journal of Ambient …, 2022 - Springer
IoT entities amass a massive quantity of sensing data and transmit it to the cloud for
processing as well as reasoning. Such disparate networks raise numerous research …

[HTML][HTML] 一种车载网隐私保护方案的分析与改进

李涛, 张静, 杨皓 - 2020 - html.rhhz.net
一种车载网隐私保护方案的分析与改进 引用本文 李涛, 张静, 杨皓. 一种车载网隐私保护方案的
分析与改进[J]. 北京邮电大学学报, 2020, 43(1): 104-110. LI Tao, ZHANG Jing, YANG Hao …

[HTML][HTML] 基于安全多方计算的车载网隐私保护机制

宋成, 张明月, 彭维平, 贾宗璞, 刘志中 - 2017 - html.rhhz.net
摘要为了解决当前车载网隐私保护机制的安全性和效率问题, 基于安全多方计算理论和匿名认证
协议, 提出了一种新的车载网节点隐私保护方案. 该方案利用线性方程组的求解理论 …

Security and Privacy of Electric Vehicles in Intelligent Speed Advisory Systems

S Li, L Cheng - IEEE Consumer Electronics Magazine, 2024 - ieeexplore.ieee.org
Smart consumer electronics, particularly electric vehicles (EVs), have become integral to
modern life as smart cities evolve. Intelligent speed advisory (ISA) systems utilize advanced …

Using information entropy to analyze secure multi-party computation protocol

Y Luo, Y Chen, T Li, Y Wang… - … Intl Conf on Cloud and Big …, 2021 - ieeexplore.ieee.org
Secure multi-party computation (SMPC) is an important research field in cryptography,
secure multi-party computation has a wide range of applications in practice. Accordingly …