咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 6 篇 secure data proc...
  • 2 篇 security
  • 2 篇 encryption
  • 1 篇 sustainable
  • 1 篇 computing node s...
  • 1 篇 homomorphic encr...
  • 1 篇 compressed sensi...
  • 1 篇 homomorphic encr...
  • 1 篇 cryptographic ha...
  • 1 篇 public key crypt...
  • 1 篇 hardware acceler...
  • 1 篇 sparse matrices
  • 1 篇 computational ef...
  • 1 篇 integrity
  • 1 篇 resource managem...
  • 1 篇 data communicati...
  • 1 篇 data mining
  • 1 篇 volunteer comput...
  • 1 篇 servers
  • 1 篇 local data agent

机构

  • 1 篇 tohoku univ cybe...
  • 1 篇 natl tech univ u...
  • 1 篇 taras shevchenko...
  • 1 篇 chitkara univers...
  • 1 篇 inst mines telec...
  • 1 篇 beijing univ pos...
  • 1 篇 tohoku univ grad...
  • 1 篇 beijing univ pos...
  • 1 篇 santa clara univ...
  • 1 篇 north carolina s...
  • 1 篇 qilu univ techno...
  • 1 篇 beijing univ pos...
  • 1 篇 cent china norma...

作者

  • 1 篇 gu xiaohui
  • 1 篇 pistono maxime
  • 1 篇 bellafqira reda
  • 1 篇 mukhin v. ye.
  • 1 篇 singh gurdeep
  • 1 篇 wu wei
  • 1 篇 wen liting
  • 1 篇 yu ting
  • 1 篇 zhengbing hu
  • 1 篇 kornaga ya. i.
  • 1 篇 du juan
  • 1 篇 kobayashi hiroak...
  • 1 篇 tong fenghua
  • 1 篇 herasymenko o. y...
  • 1 篇 takizawa hiroyuk...
  • 1 篇 peng haipeng
  • 1 篇 mittal sonam
  • 1 篇 liu yuhong
  • 1 篇 coatrieux goueno...
  • 1 篇 wang hong

语言

  • 6 篇 英文
检索条件"主题词=secure data processing"
6 条 记 录,以下是1-10 订阅
排序:
A secure and Efficient data Transmission Method With Multilevel Concealment Function Based on Chaotic Compressive Sensing
收藏 引用
IEEE SENSORS JOURNAL 2023年 第17期23卷 19823-19841页
作者: Wu, Wei Peng, Haipeng Wen, Liting Liu, Yuhong Tong, Fenghua Li, Lixiang Beijing Univ Posts & Telecommun Informat & Comp Sci Cyberspace Secur Beijing Peoples R China Beijing Univ Posts & Telecommun Sch CyberSpace Secur Beijing Peoples R China Beijing Univ Posts & Telecommun Digital Media Technol Beijing Peoples R China Santa Clara Univ Dept Comp Engn Santa Clara CA USA Qilu Univ Technol Shandong Acad Sci Shandong Prov Key Lab Comp Networks Shandong Comp Sci CtrNatl Supercomp Ctr Jinan Shandong Shandong Peoples R China
As a result of the information explosion and the development of the technology of the Internet of Things (IoT), tons of data are collected and transmitted, some of which may concern private or confidential information... 详细信息
来源: 评论
Integer-Based Homomorphic Encryption: Evaluation and FPGA Performance Enhancements  3
Integer-Based Homomorphic Encryption: Evaluation and FPGA Pe...
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Singh, Gurdeep Mittal, Sonam Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
In this paper, we provide a thorough literature review on the field of integer homomorphic encryption when it is incorporated into FPGAs. Homomorphic encryption allows one to perform operations on ciphertexts and get ... 详细信息
来源: 评论
Cryptosystem Conversion, Packing and Matrix processing of Homomorphically Encrypted data: Application to IOT Devices
收藏 引用
IEEE ACCESS 2021年 9卷 28302-28316页
作者: Pistono, Maxime Bellafqira, Reda Coatrieux, Gouenou Inst Mines Telecom IMT Atlantique INSERM UMR 1101 F-29238 Brest France
In this paper, we propose a secure protocol that allows processing encrypted data emitted by an IOT device with low computational capabilities. Its originality is threefold. It first relies on a new fast algorithm whi... 详细信息
来源: 评论
RESOURCE MANAGEMENT IN A DISTRIBUTED COMPUTER SYSTEM WITH ALLOWANCE FOR THE LEVEL OF TRUST TO COMPUTATIONAL COMPONENTS
收藏 引用
CYBERNETICS AND SYSTEMS ANALYSIS 2017年 第2期53卷 312-322页
作者: Zhengbing, Hu Mukhin, V. Ye. Kornaga, Ya. I. Herasymenko, O. Yu. Cent China Normal Univ Wuhan Peoples R China Natl Tech Univ Ukraine Igor Sikorsky Kyiv Polytech Kiev Ukraine Taras Shevchenko Natl Univ Kyiv Kiev Ukraine
This article considers the ensuring of secure data processing in distributed computer systems (DCSs), which is important for a certain class of computing tasks. An approach to the resource management in DCSs is propos... 详细信息
来源: 评论
On Verifying Stateful dataflow processing Services in Large-Scale Cloud Systems  10
On Verifying Stateful Dataflow Processing Services in Large-...
收藏 引用
17th ACM Conference on Computer and Communications Security (CCS)
作者: Du, Juan Gu, Xiaohui Yu, Ting North Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a novel RObust Service Integrity Attesta... 详细信息
来源: 评论
A Performance Study of secure data Mining on the Cell Processor
收藏 引用
INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING 2009年 第2期1卷 30-44页
作者: Wang, Hong Takizawa, Hiroyuki Kobayashi, Hiroaki Tohoku Univ Grad Sch Informat Sci Sendai Miyagi Japan Tohoku Univ Cyberscience Ctr Sendai Miyagi Japan
This article examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the potential to provide massive computing p... 详细信息
来源: 评论