[1]
|
An Analysis of Elliptic Curve Cryptography Secret Keys For Use In Cloud Workload Balancing And Security Provisioning
2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC),
2023
DOI:10.1109/ICAISC58445.2023.10199865
|
|
|
[2]
|
An Analysis of Elliptic Curve Cryptography Secret Keys For Use In Cloud Workload Balancing And Security Provisioning
2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC),
2023
DOI:10.1109/ICAISC58445.2023.10199865
|
|
|
[3]
|
Homomorphic Encryption: Hands Inside the Gloves
2023 3rd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA),
2023
DOI:10.1109/ICIMIA60377.2023.10426576
|
|
|
[4]
|
Homomorphic Encryption: Hands Inside the Gloves
2023 3rd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA),
2023
DOI:10.1109/ICIMIA60377.2023.10426576
|
|
|
[5]
|
A hybrid RSA-DH cipher for Signed Encrypted Messages
2019 International Multidisciplinary Information Technology and Engineering Conference (IMITEC),
2019
DOI:10.1109/IMITEC45504.2019.9015847
|
|
|
[6]
|
Secure Multiparty Computation and Privacy Preserving scheme using Homomorphic Elliptic Curve Cryptography
2019 International Conference on Intelligent Computing and Control Systems (ICCS),
2019
DOI:10.1109/ICCS45141.2019.9065645
|
|
|
[7]
|
SecSIFT
ACM Transactions on Multimedia Computing, Communications, and Applications,
2016
DOI:10.1145/2978574
|
|
|
[8]
|
SecSIFT
ACM Transactions on Multimedia Computing, Communications, and Applications,
2016
DOI:10.1145/2978574
|
|
|
[9]
|
Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS),
2016
DOI:10.1109/BigDataSecurity-HPSC-IDS.2016.51
|
|
|
[10]
|
Secure multiparty computation using secret sharing
2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES),
2016
DOI:10.1109/SCOPES.2016.7955564
|
|
|
[11]
|
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Proceedings of the ACM International Conference on Multimedia - MM '14,
2014
DOI:10.1145/2647868.2654941
|
|
|
[12]
|
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Proceedings of the 22nd ACM international conference on Multimedia,
2014
DOI:10.1145/2647868.2654941
|
|
|