Volume : XIV, Issue : II, March - 2024 CERTAIN COMPUTATION PROTOCOL SUITE FOR PRIVACY SEQUESTERED APPLICATIONS Mahantesh Radderatti, Dr. Shashi By : Laxmi Book Publication Abstract : Secure communication and computation protocols are more important than ever in the digital age due to the growing concerns about data privacy. Keywords : Article : Cite This Article : Mahantesh Radderatti, Dr. Shashi(2024). CERTAIN COMPUTATION PROTOCOL SUITE FOR PRIVACY SEQUESTERED APPLICATIONS. Indian Streams Research Journal, Vol. XIV, Issue. II, http://isrj.org/UploadedData/11194.pdf References : - 1. Boneh, D., Gentry, C., & Halevi, S. (2018). Cryptography from lattice problems: A survey. In D. Boneh
- 2. Brakerski, Z., & Vaikuntanathan, V. (2011). Fully homomorphic encryption from ring-LWE and security for key-dependent messages. Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science
|
Article Post Production
No data exists for the row/column.
|