Muutke küpsiste eelistusi

E-raamat: Fully Homomorphic Encryption in Real World Applications

Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 159,93 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.

Introduction.- Mathematical Background.- Searching and Sorting on Encrypted Data.- Translating Algorithms to Handle Fully Homomorphic Encrypted Data.- Secure Database Handling.- Encrypted Processor Design.- Conclusion.
Ayantika Chatterjee is currently working as  Assistant Professor of Indian Institute of Technology, Kharagpur, India. Previously, she was working as a  Research Scientist for Data Center Technologies (DCT) at the Data Storage Institute (DSI), part of the Agency for Science, Technology and Research (A*STAR), Singapore. She received her PhD from Department of Computer Science and Engineering, Indian Institute of Technology (IIT) in Kharagpur, India, and published in different peer-reviewed conferences and journals. Her research interests include encrypted computation, security of cloud, cyber-physical systems and their respective VLSI implementations. Khin Mi Mi Aung received her PhD in Computer Engineering from Korea Aerospace University in 2006. She is currently working as a scientist with A*STAR, Data Storage Institute, Singapore. Her research interests include data and information security, data centers, and network storage technologies.She has published on data security in numerous international journals and conference proceedings.