{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:51:10Z","timestamp":1752231070094},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T00:00:00Z","timestamp":1686009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T00:00:00Z","timestamp":1686009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,6]]},"DOI":"10.1109\/eucnc\/6gsummit58263.2023.10188286","type":"proceedings-article","created":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T14:09:41Z","timestamp":1690380581000},"page":"466-471","source":"Crossref","is-referenced-by-count":7,"title":["Fully Homomorphic Encryption: Precision Loss in Wireless Mobile Communication"],"prefix":"10.1109","author":[{"given":"Sogo Pierre","family":"Sanon","sequence":"first","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence,Kaiserslautern,D-67663"}]},{"given":"Christoph","family":"Lipps","sequence":"additional","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence,Kaiserslautern,D-67663"}]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[{"name":"Institute for Wireless Communication and Navigation, RPTU Kaiserslautern-Landau,Kaiserslautern,D-67663"}]}],"member":"263","reference":[{"key":"ref13","first-page":"279","article-title":"BFV, CKKS, TFHE:Which One is the Best for a Secure Neural Network Evaluation in the Cloud?","author":"clet","year":"0","journal-title":"In Applied Cryptography and Network Security Workshops ACNS 2021 Satellite Workshops AIBlock AIHWS AIoTS CIMSS Cloud S&P SCI SecMT and SiMLA Kamakura Japan June 21&#x2013;24 2021 Proceedings"},{"key":"ref12","first-page":"1","article-title":"Managing the Fifth Generation (5G) Wireless Mobile Communication: A Machine Learning Approach for Network Traffic Prediction","author":"baradie","year":"2022","journal-title":"Mobility Aware Technologies and Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00035"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCNM.2005.1544219"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8762038"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3528580.3532845"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JNS2.2012.6249248"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref17","first-page":"120","article-title":"Approx-imate homomorphic encryption with reduced approxi-mation error","author":"kim","year":"0","journal-title":"Topics in Cryptology-CT-RSA 2022 Cryptographers' Track at the RSA Conference 2022 Virtual Event March 1&#x2013;2 2022 Proceedings"},{"key":"ref16","article-title":"Federated learning: Strate-gies for improving communication efficiency","author":"kone?ny","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-018-0401-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"journal-title":"Monitoring with Prometheus","year":"2018","author":"turnbull","key":"ref24"},{"key":"ref23","article-title":"Edge computing and the fifth generation (5G) mobile communication: a virtualized, distributed system towards a new networking concept","author":"reddy","year":"2021","journal-title":"Proceedings of the Workshop on Next Generation Networks and Applications (NGNA) Kaiserslautern Germany"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6888-9_6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"journal-title":"Free5GC","year":"0","key":"ref22"},{"journal-title":"TenSEAL A Library for Encrypted Machine Learning Using Homomorphic Encryption","year":"2020","author":"benaissa","key":"ref21"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISESD56103.2022.9980695"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900461"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/jjfinec\/nbu005"},{"key":"ref9","first-page":"301","article-title":"The limi-tations of federated learning in sybil settings","author":"fung","year":"2020","journal-title":"23rd International Symposium on Research in Attacks Intrusions and Defenses (RAID 2020)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060116"},{"key":"ref3","first-page":"1","article-title":"On the Application of Homomorphic Encryption to Face Identification","author":"drozdowski","year":"2019","journal-title":"2019 International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref6","article-title":"On the precision loss in approximate homomorphic encryption","author":"costache","year":"2022","journal-title":"Cryptology ePrint Archive"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2363928"}],"event":{"name":"2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit)","start":{"date-parts":[[2023,6,6]]},"location":"Gothenburg, Sweden","end":{"date-parts":[[2023,6,9]]}},"container-title":["2023 Joint European Conference on Networks and Communications &amp; 6G Summit (EuCNC\/6G Summit)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10187889\/10188221\/10188286.pdf?arnumber=10188286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T13:38:27Z","timestamp":1692020307000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10188286\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/eucnc\/6gsummit58263.2023.10188286","relation":{},"subject":[],"published":{"date-parts":[[2023,6,6]]}}}