2012
DOI: 10.1155/2012/901247
|View full text |Cite
|
Sign up to set email alerts
|

Advances in Network-Based Information Systems

Abstract: Tremendous advances in the information systems and the communication technologies for the last two decades have made our society an all-connected network environment. Stand-alone or stationarynetworked information systems from the first decade have been integrated into small chips or devices as system-on-chips. In particular, the wireless communication network has superimposed on the existing wired network over the various mobile devices during the last decade. Additionally, different types of access networks … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…In the novel, It can find many kinds of research with respect to preserving the privacy of data process, which is concisely reviewed [9] was understood as the FHE, which was supported on a common homomorphism method with the encryption function [11] Gentry's greater performance produced the restriction of this approach was that the time complexity was too high to be applicable and the timing measurements completed by other scholars also verify its inefficiency. It was reported that encrypting a bit plain-text Big Data constructs a huge amount of bits for cipher-texts, could extend millions of bits in some situations [15]. The estimated workload Big Data rapidly enlarge as the amount of evaluation trading operations was combined with the number of variables active in the calculation [13], [14].…”
Section: Related Workmentioning
confidence: 99%
“…In the novel, It can find many kinds of research with respect to preserving the privacy of data process, which is concisely reviewed [9] was understood as the FHE, which was supported on a common homomorphism method with the encryption function [11] Gentry's greater performance produced the restriction of this approach was that the time complexity was too high to be applicable and the timing measurements completed by other scholars also verify its inefficiency. It was reported that encrypting a bit plain-text Big Data constructs a huge amount of bits for cipher-texts, could extend millions of bits in some situations [15]. The estimated workload Big Data rapidly enlarge as the amount of evaluation trading operations was combined with the number of variables active in the calculation [13], [14].…”
Section: Related Workmentioning
confidence: 99%