[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey
M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …
Internet of Things (IoT), decentralized approaches for trust management are gaining …
Hardware-accelerated platforms and infrastructures for network functions: A survey of enabling technologies and research studies
In order to facilitate flexible network service virtualization and migration, network functions
(NFs) are increasingly executed by software modules as so-called “softwarized NFs” on …
(NFs) are increasingly executed by software modules as so-called “softwarized NFs” on …
Stochastic switching and analog-state programmable memristor and its utilization for homomorphic encryption hardware
Homomorphic encryption performs computations on encrypted data without decrypting,
thereby eliminating security issues during the data communication between clouds and …
thereby eliminating security issues during the data communication between clouds and …
Memfhe: End-to-end computing with fully homomorphic encryption in memory
The increasing amount of data and the growing complexity of problems have resulted in an
ever-growing reliance on cloud computing. However, many applications, most notably in …
ever-growing reliance on cloud computing. However, many applications, most notably in …
INSPIRE: in-s torage p rivate i nformation re trieval via protocol and architecture co-design
Private Information Retrieval (PIR) plays a vital role in secure, database-centric applications.
However, existing PIR protocols explore a massive working space containing hundreds of …
However, existing PIR protocols explore a massive working space containing hundreds of …
Medha: Microcoded hardware accelerator for computing on encrypted data
Homomorphic encryption (HE) enables computation on encrypted data, and hence it has a
great potential in privacy-preserving outsourcing of computations to the cloud. Hardware …
great potential in privacy-preserving outsourcing of computations to the cloud. Hardware …
A privacy-preserving framework using homomorphic encryption for smart metering systems
Smart metering systems (SMSs) have been widely used by industrial users and residential
customers for purposes such as real-time tracking, outage notification, quality monitoring …
customers for purposes such as real-time tracking, outage notification, quality monitoring …
REED: Chiplet-based accelerator for fully homomorphic encryption
Abstract Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and
has many applications. However, its practical implementation faces massive computation …
has many applications. However, its practical implementation faces massive computation …
Privacy-preserving deep learning based on multiparty secure computation: A survey
Deep learning (DL) has demonstrated superior success in various of applications, such as
image classification, speech recognition, and anomalous detection. The unprecedented …
image classification, speech recognition, and anomalous detection. The unprecedented …
Scalability Limitations of Processing-in-Memory using Real System Evaluations
G Jonatan, H Cho, H Son, X Wu, N Livesay… - Proceedings of the …, 2024 - dl.acm.org
Processing-in-memory (PIM), where the compute is moved closer to the memory or the data,
has been widely explored to accelerate emerging workloads. Recently, different PIM-based …
has been widely explored to accelerate emerging workloads. Recently, different PIM-based …