Search

Your search keyword '"privacy-preserving"' showing total 252 results

Search Constraints

Start Over You searched for: Descriptor "privacy-preserving" Remove constraint Descriptor: "privacy-preserving" Topic cloud computing Remove constraint Topic: cloud computing
252 results on '"privacy-preserving"'

Search Results

1. NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.

2. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services.

3. PPFLV: privacy-preserving federated learning with verifiability.

4. Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud database.

5. Dual-branch networks for privacy-preserving cross-modal retrieval in cloud computing.

6. Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption.

7. EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation.

8. A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud.

9. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples.

10. EPCQ: Efficient Privacy-Preserving Contact Query Processing over Trajectory Data in Cloud

11. Privacy-Preserving Image Retrieval with Multi-Modal Query.

13. Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment.

14. SAPMS: A Semantic-Aware Privacy-Preserving Multi-keyword Search Scheme in Cloud

16. Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments.

17. Enhancing Cloud Data Privacy with a Scalable Hybrid Approach: HE-DPSMC.

18. Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing.

19. 安全高效的隐私保护公共可验证矩阵乘法外包计算方案.

20. Understanding Policy and Technical Aspects of AI-enabled Smart Video Surveillance to Address Public Safety

21. Query on the cloud: improved privacy-preserving k-nearest neighbor classification over the outsourced database.

22. Privacy-Preserving and Security in SDN-Based IoT: A Survey

24. Credential-Based Authentication Mechanism for IoT Devices in Fog-Cloud Computing

25. Web-based practical privacy-preserving distributed image storage for financial services in cloud computing.

26. A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity †.

27. Software-driven secure framework for mobile healthcare applications in IoMT.

28. Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment.

29. A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment.

30. State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing.

31. Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments

32. Efficient Biometric Identification on the Cloud With Privacy Preservation Guarantee

33. Certificateless public auditing with data privacy preserving for cloud-based smart grid data

34. A Blockchain-Based Data Sharing System with Enhanced Auditability.

35. Efficient Privacy-Preserving Skyline Queries over Outsourced Cloud

36. CUNA: A privacy preserving medical records storage in cloud environment using deep encryption

37. A Differential Approach for Data and Classification Service-Based Privacy-Preserving Machine Learning Model in Cloud Environment.

38. Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data.

39. A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs.

40. DAP2CMH: Deep Adversarial Privacy-Preserving Cross-Modal Hashing.

41. Privacy-Preserving Multi-Class Support Vector Machine Model on Medical Diagnosis.

42. Multi-user privacy-preserving image search in distributed cloud computing.

43. Privacy-preserving multi-party logistic regression in cloud computing.

44. Privacy-preserving geo-tagged image search in edge–cloud computing for IoT.

45. A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems.

47. A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme

48. An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases

49. Privacy-Preserving Computation for Large-Scale Security-Constrained Optimal Power Flow Problem in Smart Grid

Catalog

Books, media, physical & digital resources