A highly unified reconfigurable multicore architecture to speed up NTT/INTT for homomorphic polynomial multiplication
Y Su, BL Yang, C Yang, ZP Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The ring learning with error (RLWE)-based fully homomorphic encryption (FHE) scheme has
become one of the most promising FHE schemes. However, its performance is limited by the …
become one of the most promising FHE schemes. However, its performance is limited by the …
DataSeal: Ensuring the Verifiability of Private Computation on Encrypted Data
Fully Homomorphic Encryption (FHE) allows computations to be performed directly on
encrypted data without needing to decrypt it first. This" encryption-in-use" feature is crucial …
encrypted data without needing to decrypt it first. This" encryption-in-use" feature is crucial …
A bare PC TLS webmail server
P Appiah-Kubi, RK Karne… - 2012 International …, 2012 - ieeexplore.ieee.org
Bare PC systems have no operating system or kernel, and can be used for building self-
supporting server applications that perform better than conventional servers. The bare PC …
supporting server applications that perform better than conventional servers. The bare PC …
[HTML][HTML] Study of the security enhancements in various e-mail systems
AS Babrahem, ET Alharbi, AM Alshiky… - Journal of Information …, 2014 - scirp.org
E-mail security becomes critical issue to research community in the field of information
security. Several solutions and standards have been fashioned according to the recent …
security. Several solutions and standards have been fashioned according to the recent …
Secure and trusted mobile commerce system based on virtual currencies
I Kounelis - 2015 - diva-portal.org
With the widespread usage of mobile devices and their applications, many areas of
innovation have created a multitude of opportunities for mobile technologies to be deployed …
innovation have created a multitude of opportunities for mobile technologies to be deployed …
A proxy re-encryption-based webmail and file sharing system for collaboration in cloud computing environment
BS Rawal - 2018 International Conference on Computational …, 2018 - ieeexplore.ieee.org
Most email users are still using the same email address set up fifteen years ago. Attained
from their Internet service provider or having a free email account provided by Yahoo, Gmail …
from their Internet service provider or having a free email account provided by Yahoo, Gmail …
Accessing protected content for archiving
M Baessler, P Hoffmann, M Lorch, J Maletz… - US Patent …, 2017 - Google Patents
(Continued) Primary Examiner—Lisa Lewis Assistant Examiner—Maung Lwin (74) Attorney,
Agent, or Firm—DeLio, Peterson & Curcio, LLC; Kelly M. Nowak (57) ABSTRACT According …
Agent, or Firm—DeLio, Peterson & Curcio, LLC; Kelly M. Nowak (57) ABSTRACT According …
Secure and privacy-enhanced e-mail system based on the concept of proxies
Security and privacy on the Internet and especially the e-mail, is becoming more and more
important and crucial for the user. The requirements for the protection of e-mail include …
important and crucial for the user. The requirements for the protection of e-mail include …
[PDF][PDF] OpenPGP ile E-posta şifreleme: Muğla Sıtkı Koçman Üniversitesi Uygulaması
E-posta; önemli bilgiler barındıran, çağın koşullarına uygun bir şekilde geliştirilmesi
gereken, kullanıcı sayısı gün geçtikçe artan ve sayısal iletişimde kullanılan bir servistir. E …
gereken, kullanıcı sayısı gün geçtikçe artan ve sayısal iletişimde kullanılan bir servistir. E …
A study on a new method of sending an e-mail with an attachment using a wireless terminal
EJ Kim, JD Park - … Systems, Networks & Digital Sign (CSNDSP), 2014 - ieeexplore.ieee.org
This paper provides a method for forwarding email including an attached file in wireless
communication terminal. In particular, in terms of a mobile communication terminal suitable …
communication terminal. In particular, in terms of a mobile communication terminal suitable …