Proceedings of the 24th Asia and South Pacific Design Automation Conference 2019
DOI: 10.1145/3287624.3287699
|View full text |Cite
|
Sign up to set email alerts
|

Towards practical homomorphic email filtering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…AI/ML via general crypto or MPC [34,76,155,198,284,315,323,370,383] (total: 9) AI/ML or matching fully clientside [4,86,128,138,207,214,352,366,377] (total: 9) Metadata-based [58,176,262,368,384] (total: 5) Other [269,329,351] (total: 3)…”
Section: Spam Filteringmentioning
confidence: 99%
See 1 more Smart Citation
“…AI/ML via general crypto or MPC [34,76,155,198,284,315,323,370,383] (total: 9) AI/ML or matching fully clientside [4,86,128,138,207,214,352,366,377] (total: 9) Metadata-based [58,176,262,368,384] (total: 5) Other [269,329,351] (total: 3)…”
Section: Spam Filteringmentioning
confidence: 99%
“…This detection approach was overwhelmingly used in TLS middleboxes implementing deep packet inspection via searchable encryption or trusted hardware; see Appendix B for details. Less frequently, this approach was also used for other use cases, including text filtering [269], and detection of spam [34,383], malware and phishing [177,374], and hate speech [305,384].…”
Section: Rules and Patternsmentioning
confidence: 99%