4   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung    
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Hyundo Yoon, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee and Junbeom Hur    
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Pr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yongbo Jiang, Yuan Zhou and Tao Feng    
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc... ver más
Revista: Information    Formato: Electrónico

 
en línea
Min Choi, Shinde Rupali Kiran, Se-Chang Oh and Oh-Young Kwon    
In this paper, we present a badge awarding system for performance assessment in education using blockchain technology. Learners will be awarded badges, which are certified for a predetermined level of progress in terms of learning. All the badges are sto... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »