A Framework of Privacy Preserving Anomaly Detection
Author:
Affiliation:
1. RIKEN Center for Advanced Intelligence Project, Tokyo, Japan
2. National Institute of Information and Communications Technology, Tokyo, Japan
3. Kobe University & National Institute of Information and Communications Technology, Kobe, Japan
Funder
Japan Science and Technology Agency
Publisher
ACM
Link
https://dl.acm.org/doi/pdf/10.1145/3139550.3139551
Reference35 articles.
1. Masayuki Abe Jens Groth Miyako Ohkubo and Takeya Tango. 2014. Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups. In CRYPTO. 241--260. 10.1007/978-3-662-44371-2_14 Masayuki Abe Jens Groth Miyako Ohkubo and Takeya Tango. 2014. Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups. In CRYPTO. 241--260. 10.1007/978-3-662-44371-2_14
2. Masayuki Abe Fumitaka Hoshino and Miyako Ohkubo. 2016. Design in Type-I Run in Type-III: Fast and Scalable BilinearType Conversion Using Integer Programming. In CRYPTO. 387-- 415. Masayuki Abe Fumitaka Hoshino and Miyako Ohkubo. 2016. Design in Type-I Run in Type-III: Fast and Scalable BilinearType Conversion Using Integer Programming. In CRYPTO. 387-- 415.
3. D. F. Aranha and C. P. L. Gouvêa. [n. d.]. RELIC is an Efficient LIbrary for Cryptography. https://github.com/relic-toolkit/relic. ([n. d.]). D. F. Aranha and C. P. L. Gouvêa. [n. d.]. RELIC is an Efficient LIbrary for Cryptography. https://github.com/relic-toolkit/relic. ([n. d.]).
4. Updating key size estimations for pairings;Barbulescu Razvan;IACR Cryptology ePrint Archive,2017
5. Paulo S. L. M. Barreto Ben Lynn and Michael Scott. 2002. Constructing Elliptic Curves with Prescribed Embedding Degrees. In SCN. 257--267. Paulo S. L. M. Barreto Ben Lynn and Michael Scott. 2002. Constructing Elliptic Curves with Prescribed Embedding Degrees. In SCN. 257--267.
Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Recurring verification of interaction authenticity within bluetooth networks;Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2021-06-28
2. Privacy-Preserving Data Analysis: Providing Traceability without Big Brother;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2021-01-01
3. Detecting abnormal sensors via machine learning: An IoT farming WSN-based architecture case study;Measurement;2020-11
4. Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions;Security and Communication Networks;2019-08-26
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3