Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Ahmed El-Yahyaoui"'
Publikováno v:
Technologies, Vol 7, Iss 1, p 21 (2019)
Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive d
Externí odkaz:
https://doaj.org/article/969bf57684f74a00acbacbe2f575c385
Autor:
Ahmed EL-YAHYAOUI, Fouzia OMARY
Publikováno v:
International Journal of Communication Networks and Information Security (IJCNIS). 14
The Modulo 1 Factoring Problem (M1FP) is an elegant mathematical problem which could be exploited to design safe cryptographic protocols and encryption schemes that resist to post quantum attacks. The ELGAMAL encryption scheme is a well-known and eff
Publikováno v:
Digital Technologies and Applications ISBN: 9783031019418
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9915e3f7a94526cdb3694efac964089e
https://doi.org/10.1007/978-3-031-01942-5_19
https://doi.org/10.1007/978-3-031-01942-5_19
Publikováno v:
SSRN Electronic Journal.
Autor:
Ahmed EL-YAHYAOUI, Fouzia OMARY
Publikováno v:
International Journal of Communication Networks and Information Security (IJCNIS). 13
Security and privacy are huge challenges in biometric systems. Biometrics are sensitive data that should be protected from any attacker and especially attackers targeting the confidentiality and integrity of biometric data. In this paper an extensive
Publikováno v:
International Journal of Embedded and Real-Time Communication Systems. 10:1-20
Fully homomorphic encryption schemes (FHE) are a type of encryption algorithm dedicated to data security in cloud computing. It allows for performing computations over ciphertext. In addition to this characteristic, a verifiable FHE scheme has the ca
Fully homomorphic encryption schemes (FHE) are a type of encryption algorithm dedicated to data security in cloud computing. It allows for performing computations over ciphertext. In addition to this characteristic, a verifiable FHE scheme has the ca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b8b5f272df3a3ba527e264730e4c06f5
https://doi.org/10.4018/978-1-7998-7705-9.ch059
https://doi.org/10.4018/978-1-7998-7705-9.ch059
Publikováno v:
Cloud Computing and Big Data: Technologies, Applications and Security ISBN: 9783319977188
Optimizations in fully homomorphic encryption are the guidelines of many cryptographic researches after Gentry’s breakthrough in 2009. In this chapter, we sketch different technics to optimize and simplify fully homomorphic encryption schemes. Amon
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2291efa3e5c19448b79364c74f69d17d
https://doi.org/10.1007/978-3-319-97719-5_11
https://doi.org/10.1007/978-3-319-97719-5_11
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319913360
Cloud computing is a new paradigm of information technology and communication. Performing smart computations in a context of cloud computing and big data is highly appreciated today. Fully homomorphic encryption (FHE) is a smart category of encryptio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::336b234e5fcd4ff7a0fe13e3921a668d
https://doi.org/10.1007/978-3-319-91337-7_29
https://doi.org/10.1007/978-3-319-91337-7_29
Publikováno v:
2018 4th International Conference on Computer and Technology Applications (ICCTA).
Data privacy in cloud computing is a fundamental issue today. Fully homomorphic encryption schemes are highly recommended for data security in cloud computing. In fact, confidentiality of sensible data can be preserved even if a non-trusted cloud ser