{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:47:56Z","timestamp":1749793676238,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031079689"},{"type":"electronic","value":"9783031079696"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-07969-6_12","type":"book-chapter","created":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T22:02:29Z","timestamp":1656799349000},"page":"153-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Homomorphic Method Additive Using Pailler and Multiplicative Based on RSA in Integers Numbers"],"prefix":"10.1007","author":[{"given":"Hamza","family":"Touil","sequence":"first","affiliation":[]},{"given":"Nabil","family":"El Akkad","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Satori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,3]]},"reference":[{"issue":"1","key":"12_CR1","first-page":"59","volume":"11","author":"H Touil","year":"2021","unstructured":"Touil, H., El Akkad, N., Satori, K.: Secure and guarantee QoS in a video sequence: a new approach based on TLS protocol to secure data and RTP to ensure real-time exchanges. Int. J. Saf. Secur. Eng. 11(1), 59\u201368 (2021)","journal-title":"Int. J. Saf. Secur. Eng."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Touil, H., El Akkad, N., Satori, K.: Text encryption: hybrid cryptographic method using Vigenere and Hill Ciphers. In: 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, pp. 1\u20136 (2020)","DOI":"10.1109\/ISCV49265.2020.9204095"},{"issue":"6","key":"12_CR3","first-page":"785","volume":"10","author":"H Touil","year":"2020","unstructured":"Touil, H., El Akkad, N., Satori, K.: H-Rotation: secure storage and retrieval of passphrases on the authentication process. Int. J. Saf. Secur. Eng. 10(6), 785\u2013796 (2020)","journal-title":"Int. J. Saf. Secur. Eng."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Touil, H., El Akkad, N., Satori, K.: Securing the storage of passwords based on the MD5 HASH transformation. In: International Conference on Digital Technologies and Applications (2021)","DOI":"10.1007\/978-3-030-73882-2_45"},{"issue":"1","key":"12_CR5","first-page":"57","volume":"50","author":"NE El Akkad","year":"2013","unstructured":"El Akkad, N.E., Merras, M., Saaidi, A., Satori, K.: Robust method for self-calibration of cameras having the varying intrinsic parameters. J. Theor. Appl. Inf. Technol. 50(1), 57\u201367 (2013)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"11","key":"12_CR6","first-page":"356","volume":"10","author":"NE El Akkad","year":"2013","unstructured":"El Akkad, N.E., Merras, M., Saaidi, A., Satori, K.: Camera self-calibration with varying parameters from two views. WSEAS Trans. Inf. Sci. Appl. 10(11), 356\u2013367 (2013)","journal-title":"WSEAS Trans. Inf. Sci. Appl."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"El Akkad, N., Saaidi, A., Satori, K.: Self-calibration based on a circle of the cameras having the varying intrinsic parameters. In: Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS, pp. 161\u2013166 (2012)","DOI":"10.1109\/ICMCS.2012.6320196"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Es-sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: Grayscale image encryption using shift bits operations. In: International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, pp. 1\u20137 (2018). https:\/\/doi.org\/10.1109\/ISACV.2018.8354028","DOI":"10.1109\/ISACV.2018.8354028"},{"key":"12_CR9","first-page":"78","volume":"872","author":"M Es-sabry","year":"2018","unstructured":"Es-sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A novel text encryption algorithm based on the two-square cipher and Caesar cipher. Commun. Comput. Inf. Sci. 872, 78\u201388 (2018)","journal-title":"Commun. Comput. Inf. Sci."},{"key":"12_CR10","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1007\/978-981-15-0947-6_55","volume":"1076","author":"M Es-sabry","year":"2020","unstructured":"Es-sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new color image encryption using random numbers generation and linear functions. Adv. Intell. Syst. Comput. 1076, 581\u2013588 (2020)","journal-title":"Adv. Intell. Syst. Comput."},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Li, R., Ishimaki, Y., Yamana, H.: Privacy preserving calculation in cloud using fully homomorphic encryption with table lookup. In: 2020 5th IEEE International Conference on Big Data Analytics, ICBDA 2020, May 2020, Article number 9101276, pp. 315\u2013322 (2020)","DOI":"10.1109\/ICBDA49040.2020.9101276"},{"issue":"10","key":"12_CR12","doi-asserted-by":"publisher","first-page":"3012","DOI":"10.35940\/ijitee.J9457.0881019","volume":"8","author":"CN Umadevi","year":"2019","unstructured":"Umadevi, C.N., Gopalan, N.P.: Privacy preserving outsourced calculations with symmetric fully homomorphic encryption. Int. J. Innov. Technol. Exploring Eng. 8(10), 3012\u20133015 (2019)","journal-title":"Int. J. Innov. Technol. Exploring Eng."},{"key":"12_CR13","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-030-57811-4_20","volume-title":"Advances in Networked-Based Information Systems","author":"L Wang","year":"2021","unstructured":"Wang, L., Saha, T.K., Aono, Y., Koshiba, T., Moriai, S.: Enhanced secure comparison schemes using homomorphic encryption. In: Barolli, L., Li, K.F., Enokido, T., Takizawa, M. (eds.) NBiS 2020. AISC, vol. 1264, pp. 211\u2013224. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-57811-4_20"},{"key":"12_CR14","unstructured":"Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. Cryptology ePrint Archive, Report 2009\/571 (2009)"},{"key":"12_CR15","unstructured":"Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. Cryptology ePrint Archive, Report, 2009\/616 (2009)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Canteaut, A., et al.: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. Cryptology EPrint Archive, Report (2015)","DOI":"10.1007\/978-3-662-52993-5_16"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Gentry, C., Halevi, S., Nigel, P.: Smart. Homomorphic evaluation of the AES circuit. Crypto (2012)","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Mousa, A., Faragallah, O.S., El-Rabaie, S., Nigm, E.M.: Security analysis of reverse encryption algorithm for databases. Int. J. Comput. Appl. (0975\u20138887) 66 (14) (2013)","DOI":"10.1109\/JEC-ECC.2013.6766404"},{"key":"12_CR19","unstructured":"Mousa, A., Faragallah, O., Nigm, E., Rabaie, E.: Evaluating the performance of reverse encryption algorithm (REA) on the databases. Int. Arab J. Inf. Technol. 10(6) (2013)"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"12_CR21","unstructured":"Rao, G., Subba, V., Uma, G.: An efficient secure message transmission in mobile ad hoc networks using enhanced homomorphic encryption scheme. GJCST-E: Netw. Web Secur. 13(9) (2013)"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.procs.2016.03.023","volume":"79","author":"MM Potey","year":"2016","unstructured":"Potey, M.M., Dhote, C.A., Sharma, D.H.: Homomorphic encryption for security of cloud data (open access). Procedia Comput. Sci. 79, 175\u2013181 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"12_CR23","first-page":"26","volume":"91","author":"PV Parmar","year":"2014","unstructured":"Parmar, P.V., Padhar, S.B., Patel, S.N., Bhatt, N.I., Jhaveri, R.H.: Survey of various homomorphic encryption algorithms and schemes. Int. J. Comput. Appl. 91, 26\u201332 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"12_CR24","unstructured":"Hizkia, N.E.: Implementasi Algoritma KriptografiKunci Publik Okamoto-Uchiyama. Informatics Engineering, Bandung Institute of Technology (2013)"},{"issue":"1","key":"12_CR25","first-page":"17","volume":"5","author":"P Kumar Arya","year":"2015","unstructured":"Kumar Arya, P., Singh Aswal, M., Kumar, V.: Comparative study of asymmetric key cryptographic algorithms. Int. J. Comput. Sci. Commun. Netw. 5(1), 17\u201321 (2015)","journal-title":"Int. J. Comput. Sci. Commun. Netw."},{"key":"12_CR26","unstructured":"Mohan, R., Dhruw, H.L., Raghvendra: An effective image encryption based on the combination of scan and Elgamal method. Int. J. Eng. Comput. Sci. 4(5), 11793\u201311796 (2015)"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 5th International Conference on Big Data and Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-07969-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T10:17:30Z","timestamp":1727518650000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-07969-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031079689","9783031079696"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-07969-6_12","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BDIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference On Big Data and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mohammed V University in Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bdiot2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.amers.org\/bdiot21\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}