Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Bernardo Pulido-Gaytan"'
Publikováno v:
PLoS ONE, Vol 19, Iss 7, p e0306420 (2024)
The widespread adoption of cloud computing necessitates privacy-preserving techniques that allow information to be processed without disclosure. This paper proposes a method to increase the accuracy and performance of privacy-preserving Convolutional
Externí odkaz:
https://doaj.org/article/9411b06664d24867bb6207f4d7b8c7db
Publikováno v:
IEEE Access, Vol 11, Pp 102189-102206 (2023)
The security issues that arise in public cloud environments raise several concerns about privacy-preserving. Conventional security practices successfully protect stored and transmitted data by encryption, but not during data processing where the data
Externí odkaz:
https://doaj.org/article/d4c390fd66a94f09ae5ff4d03456e201
Autor:
Rewer M Canosa-Reyes, Andrei Tchernykh, Jorge M Cortés-Mendoza, Bernardo Pulido-Gaytan, Raúl Rivera-Rodriguez, Jose E Lozano-Rizk, Eduardo R Concepción-Morales, Harold Enrique Castro Barrera, Carlos J Barrios-Hernandez, Favio Medrano-Jaimes, Arutyun Avetisyan, Mikhail Babenko, Alexander Yu Drozdov
Publikováno v:
PLoS ONE, Vol 17, Iss 1, p e0261856 (2022)
Containers have emerged as a more portable and efficient solution than virtual machines for cloud infrastructure providing both a flexible way to build and deploy applications. The quality of service, security, performance, energy consumption, among
Externí odkaz:
https://doaj.org/article/4a5afbd2e1d84bf0b829d4a3889af07c
Autor:
Mikhail Babenko, Andrei Tchernykh, Bernardo Pulido-Gaytan, Arutyun Avetisyan, Sergio Nesmachnow, Xinheng Wang, Fabrizio Granelli
Publikováno v:
Mathematics, Vol 10, Iss 12, p 2006 (2022)
Homomorphic encryption with the ability to compute over encrypted data without access to the secret key provides benefits for the secure and powerful computation, storage, and communication of resources in the cloud. One of its important applications
Externí odkaz:
https://doaj.org/article/107cc63c51d2429b82a574f6fd0bd690
Autor:
Andrei Tchernykh, Mikhail Babenko, Egor Shiriaev, Bernardo Pulido-Gaytan, Jorge M. Cortés-Mendoza, Arutyun Avetisyan, Alexander Yu Drozdov, Viktor Kuchukov
Publikováno v:
Computation, Vol 10, Iss 2, p 17 (2022)
Fully Homomorphic Encryption (FHE) permits processing information in the form of ciphertexts without decryption. It can ensure the security of information in common technologies used today, such as cloud computing, the Internet of Things, and machine
Externí odkaz:
https://doaj.org/article/dce4d0e0e36d41c2843ddca2a03daeb5
Autor:
Mikhail Babenko, Elena Golimblevskaia, Andrei Tchernykh, Egor Shiriaev, Tatiana Ermakova, Luis Bernardo Pulido-Gaytan, Georgii Valuev, Arutyun Avetisyan, Lana A. Gagloeva
Publikováno v:
Big Data and Cognitive Computing; Volume 7; Issue 2; Pages: 84
Homomorphic encryption (HE) is a promising solution for handling sensitive data in semi-trusted third-party computing environments, as it enables processing of encrypted data. However, applying sophisticated techniques such as machine learning, stati
Autor:
Jorge M. Cortés-Mendoza, Alexander Yu. Drozdov, Mikhail Babenko, Gleb Radchenko, Bernardo Pulido-Gaytan, Andrei Tchernykh, Arutyun Avetisyan
Publikováno v:
Peer-to-Peer Networking and Applications. 14:1666-1691
Classical machine learning modeling demands considerable computing power for internal calculations and training with big data in a reasonable amount of time. In recent years, clouds provide services to facilitate this process, but it introduces new s
Autor:
Egor Shiryaev, Ekaterina Bezuglova, Mikhail Babenko, Andrei Tchernykh, Bernardo Pulido-Gaytan, Jorge M. Cortes-Mendoza
Publikováno v:
2021 International Conference Engineering and Telecommunication (En&T).
Autor:
Elena Golimblevskaia, Egor Shiryaev, Bernardo Pulido-Gaytan, Mikhail Babenko, Andrei Tchernykh, Jorge M. Cortés-Mendoza, Arutyun Avetisyan, Sergio Nesmachnow
Publikováno v:
IPDPS Workshops
Ensuring reliable data storage in a cloud environment is a challenging problem. One of the efficient mechanisms used to solve it is the Redundant Residue Number System (RRNS) with the projection method, a commonly used mechanism for detecting errors.
Autor:
Pascal Bouvry, Arutyun Avetisyan, Albert Y. Zomaya, Gleb Radchenko, Bernardo Pulido-Gaytan, Andrei Tchernykh, Jorge M. Cortés-Mendoza, Mikhail Babenko
Publikováno v:
CCGRID
The protection of data processing is emerging as an essential aspect of data analytics, machine learning, delegation of computation, Internet of Things, medical and financial analysis, smart cities, genomics, non-disclosure searching, among others. O