Search alternatives:
update algorithm » pass algorithm (Expand Search), data algorithms (Expand Search), ipca algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
data encryption » image encryption (Expand Search)
element update » element data (Expand Search)
update algorithm » pass algorithm (Expand Search), data algorithms (Expand Search), ipca algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
data encryption » image encryption (Expand Search)
element update » element data (Expand Search)
-
1
Comparison of homomorphic encryption algorithms.
Published 2024“…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
-
2
-
3
-
4
Encryption performance.
Published 2024“…Our analyses show that this algorithm significantly improves the security and efficiency of health data exchanges. …”
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
The principles of the SM2 algorithm.
Published 2025“…It further enforces an encrypt-before-store policy to enhance data security at the storage layer. …”
-
19
-
20