[PDF][PDF] Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography.
B Murugeshwari, D Selvaraj… - … Automation & Soft …, 2023 - cdn.techscience.cn
Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique
that protects the privacy of individual data while mining those data. The most significant task …
that protects the privacy of individual data while mining those data. The most significant task …
An entropy-view secure multiparty computation protocol based on semi-honest model
Data interaction scenarios involving multiple parties in network communities have problems
of trust, data security, and reliability of the parties, and secure multiparty computation …
of trust, data security, and reliability of the parties, and secure multiparty computation …
Blockchain-based system and methods for sensitive data transactions
A blockchain-based processing framework for sensitive data is proposed. The smart network
comprises a blockchain module, an electronic contract (E-contract) layer node, and a …
comprises a blockchain module, an electronic contract (E-contract) layer node, and a …
An efficient private set intersection protocol for the cloud computing environments
O Ruan, X Huang, H Mao - 2020 IEEE 6th Intl Conference on …, 2020 - ieeexplore.ieee.org
Private set intersection (PSI) is a hot topic in cryptography and has a wide range of
applications such as privacy preserving personal properties matching and data mining …
applications such as privacy preserving personal properties matching and data mining …
Forensic verification of handwritten documents using secure multi party computation
RR Subramanian, H Mohan… - … on Advancements in …, 2021 - ieeexplore.ieee.org
The recent advance in the use of image processing techniques has benefitted many areas
including forensic and digital verification in cybercrime detection. Image processing …
including forensic and digital verification in cybercrime detection. Image processing …
Data distribution and secure data transmission using IANFIS and MECC in IoT
BM Pampapathi, M Nageswara Guptha… - Journal of Ambient …, 2022 - Springer
IoT entities amass a massive quantity of sensing data and transmit it to the cloud for
processing as well as reasoning. Such disparate networks raise numerous research …
processing as well as reasoning. Such disparate networks raise numerous research …
[HTML][HTML] 一种车载网隐私保护方案的分析与改进
李涛, 张静, 杨皓 - 2020 - html.rhhz.net
一种车载网隐私保护方案的分析与改进 引用本文 李涛, 张静, 杨皓. 一种车载网隐私保护方案的
分析与改进[J]. 北京邮电大学学报, 2020, 43(1): 104-110. LI Tao, ZHANG Jing, YANG Hao …
分析与改进[J]. 北京邮电大学学报, 2020, 43(1): 104-110. LI Tao, ZHANG Jing, YANG Hao …
[HTML][HTML] 基于安全多方计算的车载网隐私保护机制
宋成, 张明月, 彭维平, 贾宗璞, 刘志中 - 2017 - html.rhhz.net
摘要为了解决当前车载网隐私保护机制的安全性和效率问题, 基于安全多方计算理论和匿名认证
协议, 提出了一种新的车载网节点隐私保护方案. 该方案利用线性方程组的求解理论 …
协议, 提出了一种新的车载网节点隐私保护方案. 该方案利用线性方程组的求解理论 …
Security and Privacy of Electric Vehicles in Intelligent Speed Advisory Systems
S Li, L Cheng - IEEE Consumer Electronics Magazine, 2024 - ieeexplore.ieee.org
Smart consumer electronics, particularly electric vehicles (EVs), have become integral to
modern life as smart cities evolve. Intelligent speed advisory (ISA) systems utilize advanced …
modern life as smart cities evolve. Intelligent speed advisory (ISA) systems utilize advanced …
Using information entropy to analyze secure multi-party computation protocol
Secure multi-party computation (SMPC) is an important research field in cryptography,
secure multi-party computation has a wide range of applications in practice. Accordingly …
secure multi-party computation has a wide range of applications in practice. Accordingly …