Privacy-Preserving Crypto IIntroduces Secure Multiparty Computation techniques, covering theoretical frameworks, security models, and practical applications in privacy-preserving cryptography.
E-Voting: Research and ChallengesExplores e-voting research, digital algorithms, privacy challenges, and cryptographic methods in ensuring legitimacy and participation.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Homomorphic EncryptionExplores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Media Security StandardsExplores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Homomorphic EncryptionIntroduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.