Browse/Search Results: 1-8 of 8

Selected(0)Clear Items/Page:    Sort:
VESTA: A Secure and Efficient FHE-based Three-Party Vectorized Evaluation System for Tree Aggregation Models Journal article
Proceedings of the ACM on Measurement and Analysis of Computing Systems,2025, volume: 9, issue: 1
Authors:  Zhao,Haosong;  Huang,Junhao;  Chen,Zihang;  Zhu,Kunxiong;  Chen,Donglong
Favorite  |  View/Download:3/0  |  Submit date:2025/05/06
SlimBox: Lightweight Packet Inspection over Encrypted Traffic Journal article
IEEE Transactions on Dependable and Secure Computing,2023, volume: 20, issue: 5, pages: 4359-4371
Authors:  Liu, Qin;  Peng, Yu;  Jiang, Hongbo;  Wu, Jie;  Wang, Tian
Favorite  |  View/Download:10/0  |  Submit date:2023/11/21
Secure Multi-keyword Fuzzy Searches with Enhanced Service Quality in Cloud Computing Journal article
IEEE Transactions on Network and Service Management,2021, volume: 18, issue: 2, pages: 2046-2062
Authors:  Liu, Qin;  Peng, Yu;  Wu, Jie;  Wang, Tian;  Wang, Guojun
Favorite  |  View/Download:4/0  |  Submit date:2021/12/02
Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing with Fast Decryption Journal article
IEEE Transactions on Network and Service Management,2021, volume: 19, issue: 1, pages: 271-288
Authors:  Gu, Ke;  Zhang, Wen Bin;  Li, Xiong;  Jia, Wei Jia
Favorite  |  View/Download:12/0  |  Submit date:2022/02/23
FFT-Based McLaughlin's Montgomery Exponentiation without Conditional Selections Journal article
IEEE Transactions on Computers,2018, volume: 67, issue: 9, pages: 1301-1314
Authors:  Dai, Wangchen;  Chen, Donglong;  Cheung, Ray C.C.;  Koc, Cetin Kaya
Favorite  |  View/Download:9/0  |  Submit date:2022/05/19
Unequal security protection for secure multimedia communication Conference paper
2015 IEEE 4th Global Conference on Consumer Electronics, GCCE 2015, Osaka, JAPAN, OCT 27-30, 2015
Authors:  Leung, Yiu Wing;  Hou, Ricky Yuen Tan
Favorite  |  View/Download:9/0  |  Submit date:2021/10/19
Privacy-preserving mining of association rules for horizontally distributed databases based on FP-tree Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Zhangjiajie, China, NOV 16-18, 2016
Authors:  Jin, Yaoan;  Su, Chunhua;  Ruan, Na;  Jia, Weijia
Favorite  |  View/Download:5/0  |  Submit date:2021/07/30
Dynamic encryption protocol for secure multimedia communication Conference paper
2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013, Tokyo, JAPAN, OCT 1-4, 2013
Authors:  Hou, Ricky Yuen Tan;  Leung, Yiu Wing
Favorite  |  View/Download:7/0  |  Submit date:2021/10/19