최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기사물인터넷융복합논문지 = Journal of internet of things and convergence, v.9 no.2, 2023년, pp.77 - 82
두지수 (백석대학교 컴퓨터공학부) , 강혁 (고려대학교 영상정보처리협동과정) , 이근호 (백석대학교 컴퓨터공학부)
As the method of collecting and utilizing structured and unstructured data develops due to the influence of the Fourth Industrial Revolution, unwanted personal information data is also being collected and utilized, and hackers are attempting various attacks to steal information. As a result, the imp...
Nakamoto. S, "Bitcoin: A Peer-to-Peer Electronic?Cash System," 2008.
Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, "An?Overview of Blockchain Technology: Architecture,?Consensus, and Future Trends," 2017 IEEE?International Congress on Big Data (BigData?Congress), pp.557-564, 2017.
K. Christidis and M. Devetsikiotis, "Blockchains and?Smart Contracts for the Internet of Things," in IEEE?Access, Vol.4, pp.2292-2303, 2016.
T. M. Fernandez-Carames and P. Fraga-Lamas,?"Towards Post-Quantum Blockchain: A Review on?Blockchain Cryptography Resistant to Quantum?Computing Attacks," in IEEE Access, Vol.8,?pp.21091-21116, 2020.
A. Azaria, A. Ekblaw, T. Vieira and A. Lippman,?"MedRec: Using Blockchain for Medical Data Access?and Permission Management," 2016 2nd International?Conference on Open and Big Data (OBD), pp.25-30,?2016.
U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain,?"Biometric cryptosystems: issues and challenges," in?Proceedings of the IEEE, Vol.92, No.6, pp.948-960,?2004.
R. Bhupal, K. L. Sanjana, N. K. Khaneja, P. Bhartiya,?A. S. Bhat and S. B J, "Finger Vein Authentication?System," 2021 International Conference on Computer?Communication and Informatics (ICCCI), pp.1-7,?2021.
S. Pouryayevali, S. Wahabi, S. Hari and D. Hatzinakos,?"On establishing evaluation standards for ECG?biometrics," 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),?pp.3774-3778, 2014.
Vijay Bhaskar Semwal, Manish Raj, G.C. Nandi,?"Biometric gait identification based on a multilayer?perceptron," Robotics and Autonomous Systems,?Vol.65, pp.65-75, 2015.
A. Mansour, M. Sadik and E. Sabir, "Multi-factor?authentication based on multimodal biometrics?(MFA-MB) for Cloud Computing," 2015 IEEE/ACS 12th?International Conference of Computer Systems and?Applications (AICCSA), pp.1-4, 2015.
Y. C. Tsai, R. Tso, Z. -Y. Liu and K. Chen, "An?Improved Non-Interactive Zero-Knowledge Range?Proof for Decentralized Applications," 2019 IEEE?International Conference on Decentralized Applications?and Infrastructures (DAPPCON), pp.129-134, 2019.
Yuhan Yang, Lijun Wei, Jing Wu, Chengnian Long,?"Block-SMPC: A Blockchain-based Secure Multi-party?Computation for Privacy-Protected Data Sharing," In?Proceedings of the 2020 The 2nd International?Conference on Blockchain Technology (ICBCT'20),?Association for Computing Machinery, pp.46-51,?2020.
FengY, Bai T, Lu S, Tang X, Wu J, "SMPC Task?Decomposition: A Theory for Accelerating Secure?Multi-party Computation Task," 2023.
Kristin E. Lauter, "Practical applications of?homomorphic encryption," In Proceedings of the?2012 ACM Workshop on Cloud computing security?workshop (CCSW '12), Association for Computing?Machinery, pp.57-58, 2012.
Ahmed El-Yahyaoui and Mohamed Dafir EC-Chrif El?Kettani, "Fully homomorphic encryption: Searching?over encrypted cloud data," In Proceedings of the 2nd?international Conference on Big Data, Cloud and?Applications (BDCA'17), Association for Computing?Machinery, pp.1-5, 2017.
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan,?"(Leveled) Fully Homomorphic Encryption without?Bootstrapping," ACM Trans. Comput, 2014.
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan.?"(Leveled) fully homomorphic encryption without?bootstrapping," In Proceedings of the 3rd Innovations?in Theoretical Computer Science Conference (ITCS?'12). Association for Computing Machinery, pp.309-325, 2012.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.