Search alternatives:
user encryption » after encryption (Expand Search)
Showing 1 - 20 results of 60 for search 'user encryption algorithm', query time: 0.17s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Threshold encryption flow. by Zhaowei Hu (9234288)

    Published 2025
    “…The framework employs asymmetric encryption with Shamir’s (<i>t</i>, <i>n</i>) secret sharing to encrypt user queries, distributing decryption key fragments to collaborative users while generating <i>n</i> anonymous service requests through location generalization strategies. …”
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20