{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:20:33Z","timestamp":1730215233111,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/ecai.2018.8679085","type":"proceedings-article","created":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T22:31:27Z","timestamp":1555972287000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Applying Neural Network Approach to Homomorphic Encrypted Data"],"prefix":"10.1109","author":[{"given":"Ana-Maria","family":"Ghimes","sequence":"first","affiliation":[]},{"given":"Valentin-Alexandru","family":"Vladuta","sequence":"additional","affiliation":[]},{"given":"Victor-Valeriu","family":"Patriciu","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Ionita","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/FOCS.2011.94"},{"key":"ref11","first-page":"1","article-title":"Better Bootstrapping in Fully Homomorphic Encryption","author":"gentry","year":"2012","journal-title":"Public Key Cryptography - PKC 2012"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","article-title":"Fully Homomorphic Encryption over the Integers","volume":"6110","author":"dijk","year":"2010","journal-title":"Advances in Cryptology - Eurocrypt 2010"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/978-3-642-22792-9_28","article-title":"Fully Homomorphic Encryption over the Integers with Shorter Public Keys","volume":"6841","author":"coron","year":"2011","journal-title":"Advances in Cryptology-CRYPTO 2011"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/FOCS.2011.12"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2090236.2090262"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-3-642-45239-0_4","article-title":"Improved security for a ring-based fully homomorphic encryption scheme","author":"joppe w bos","year":"2013","journal-title":"Cryptography and Coding"},{"year":"0","author":"nathan dowlin","journal-title":"Manual for Using Homomorphic Encryption for Bioinformatics","key":"ref17"},{"year":"0","key":"ref18"},{"year":"0","journal-title":"Ybeer's NET Blog","key":"ref19"},{"key":"ref4","article-title":"Fully homomorphic encryption: state of art and comparison","volume":"14","author":"el-y ahyaoui","year":"2016","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"ref3","article-title":"A Fully Homomorphic Encryption Scheme","author":"gentry","year":"2009","journal-title":"Stanford University"},{"key":"ref6","first-page":"440","article-title":"Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes","volume":"6056","author":"smart","year":"2010","journal-title":"Public Key Cryptography (PKC)"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1536414.1536440"},{"key":"ref8","first-page":"337","article-title":"Faster Fully Homomorphic Encryption","volume":"6477","author":"stehl\u00e9","year":"2010","journal-title":"Advances in Cryptology - ASIACRYPT 2010"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.11591\/closer.v1i4.1438"},{"key":"ref2","article-title":"CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy","author":"dowlin","year":"0","journal-title":"Microsoft Research"},{"year":"0","journal-title":"GDPR Portal","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s10623-012-9720-4"},{"year":"0","journal-title":"Azure Service Fabric","key":"ref20"}],"event":{"name":"2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2018,6,28]]},"location":"Iasi, Romania","end":{"date-parts":[[2018,6,30]]}},"container-title":["2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672396\/8678929\/08679085.pdf?arnumber=8679085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T01:42:10Z","timestamp":1598233330000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8679085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ecai.2018.8679085","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}