Scroll to Top

Volume : XIV, Issue : II, March - 2024

CERTAIN COMPUTATION PROTOCOL SUITE FOR PRIVACY SEQUESTERED APPLICATIONS

Mahantesh Radderatti, Dr. Shashi

By : Laxmi Book Publication

Abstract :

Secure communication and computation protocols are more important than ever in the digital age due to the growing concerns about data privacy.

Keywords :


Article :


Cite This Article :

Mahantesh Radderatti, Dr. Shashi(2024). CERTAIN COMPUTATION PROTOCOL SUITE FOR PRIVACY SEQUESTERED APPLICATIONS. Indian Streams Research Journal, Vol. XIV, Issue. II, http://isrj.org/UploadedData/11194.pdf

References :

  1. 1. Boneh, D., Gentry, C., & Halevi, S. (2018). Cryptography from lattice problems: A survey. In D. Boneh
  2. 2. Brakerski, Z., & Vaikuntanathan, V. (2011). Fully homomorphic encryption from ring-LWE and security for key-dependent messages. Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science

Article Post Production

    No data exists for the row/column.
Creative Commons License
Indian Streams Research Journal by Laxmi Book Publication is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://oldisrj.lbp.world/Default.aspx.
Permissions beyond the scope of this license may be available at http://oldisrj.lbp.world/Default.aspx
Copyright � 2014 Indian Streams Research Journal. All rights reserved
Looking for information? Browse our FAQs, tour our sitemap, or contact ISRJ
Read our Privacy Policy Statement and Plagairism Policy. Use of this site signifies your agreement to the Terms of Use