|
|
|
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure...
ver más
|
|
|
|
|
|
|
Anne M. Tall and Cliff C. Zou
Controlling access to a large set of medical and social media data processed in a cloud environment using open-source Hadoop storage and Spark parallel processing.
|
|
|
|
|
|
|
Edina Jencová, Peter Ko?cák and Martina Ko?cáková
Queueing theory is currently a widely used method for optimizing activities not only in air transport but also in other sectors, in both production and the use of personnel. Using this theory, it is possible to simulate in advance various scenarios that ...
ver más
|
|
|
|
|
|
|
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ...
ver más
|
|
|
|
|
|
|
Sanaa Kaddoura, Ramzi A. Haraty, Karam Al Kontar and Omar Alfandi
In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attack...
ver más
|
|
|
|