{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:56:51Z","timestamp":1776977811779,"version":"3.51.4"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472089","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Protection Of Sensitive Personal Information Contained In Digital Files Held By Individuals With Homomorphic Encryption And AI Assistance"],"prefix":"10.1109","author":[{"given":"Ernesto A.","family":"Villegas-Jim\u00e9nez","sequence":"first","affiliation":[{"name":"Universidad Nacional Aut&#x00F3;noma de M&#x00E9;xico,Facultad de Estudios Superiores \"Arag&#x00F3;n\",Estado de M\u00e9xico,M&#x00E9;xico"}]},{"given":"Araceli","family":"Romo-Cabrera","sequence":"additional","affiliation":[{"name":"Universidad Nacional Aut&#x00F3;noma de M&#x00E9;xico,Facultad de Estudios Superiores \"Arag&#x00F3;n\",Estado de M\u00e9xico,M&#x00E9;xico"}]},{"given":"Manuel A.","family":"Manzano-Calixto","sequence":"additional","affiliation":[{"name":"Universidad Nacional Aut&#x00F3;noma de M&#x00E9;xico,Facultad de Estudios Superiores \"Arag&#x00F3;n\",Estado de M\u00e9xico,M&#x00E9;xico"}]},{"given":"Lilly M.","family":"Tello-Aguilera","sequence":"additional","affiliation":[{"name":"Universidad Nacional Aut&#x00F3;noma de M&#x00E9;xico,Facultad de Estudios Superiores \"Arag&#x00F3;n\",Estado de M\u00e9xico,M&#x00E9;xico"}]},{"given":"Armando K.","family":"S\u00e1nchez-Mata","sequence":"additional","affiliation":[{"name":"Universidad Nacional Aut&#x00F3;noma de M&#x00E9;xico,Facultad de Estudios Superiores \"Arag&#x00F3;n\",Estado de M\u00e9xico,M&#x00E9;xico"}]},{"given":"Andrea","family":"Robles-Guerrero","sequence":"additional","affiliation":[{"name":"Universidad Nacional Aut&#x00F3;noma de M&#x00E9;xico,Facultad de Estudios Superiores \"Arag&#x00F3;n\",Estado de M\u00e9xico,M&#x00E9;xico"}]},{"given":"Paula M.","family":"Hern\u00e1ndez-Ruiz","sequence":"additional","affiliation":[{"name":"Universidad Nacional Aut&#x00F3;noma de M&#x00E9;xico,Facultad de Estudios Superiores \"Arag&#x00F3;n\",Estado de M\u00e9xico,M&#x00E9;xico"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Congreso solicita a juez validar pruebas en caso de violencia sexual digital","volume-title":"congresocdmx.gob.mx"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.11.006"},{"key":"ref4","article-title":"The most urgent threat of deepfakes isn\u2019t politics, it\u2019s porn","author":"Abram"},{"key":"ref5","article-title":"El lado oscuro de la inteligencia artificial: la manipulaci\u00f3n de voz e im\u00e1genes","volume-title":"peru21.pe","author":"Valenzuela"},{"key":"ref6","article-title":"Fawkes: protecting privacy against unauthorized deep learning models","volume-title":"Proc. USENIX","author":"Shan"},{"key":"ref7","article-title":"Alumnas espa\u00f1olas son v\u00edctimas de falsos desnudos con IA, pero \u00bfes delito?","author":"Llach"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.32870\/dgedj.v9i27.754"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-024-10197-z"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3342107"},{"issue":"2","key":"ref11","article-title":"Artificial intelligence-altered videos (Deepfakes), image-based sexual abuse, and data privacy concerns","volume":"25","author":"Okolie","year":"2023","journal-title":"Journal of International Women\u2019s Studies"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21134\/zt4eht31"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.102993"},{"key":"ref14","article-title":"Criptograf\u00eda sim\u00e9trica y asim\u00e9trica y su aplicaci\u00f3n en medios digitales como las im\u00e1genes, video y audio","author":"Cardona"},{"key":"ref15","article-title":"Fawkes: protecting privacy against unauthorized deep learning models","author":"Shan","year":"2020"},{"key":"ref16","article-title":"The XEdDSA and VXEdDSA signature schemes","volume-title":"Signal Foundation","author":"Perrin","year":"2016"},{"key":"ref17","article-title":"The X3DH key agreement protocol","volume-title":"Signal Foundation","author":"Marlinspike","year":"2016"},{"key":"ref18","article-title":"The PQXDH key agreement protocol","volume-title":"Signal Foundation","author":"Kret","year":"2024"},{"key":"ref19","article-title":"The Sesame algorithm: session management for asynchronous message encryption","volume-title":"Signal Foundation","author":"Marlinspike","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110176"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/math11081777"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3603429"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127043"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.7181"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref26","article-title":"SoK: privacy-preserving deep learning with homomorphic encryption","author":"Podschwadt","year":"2022"},{"key":"ref27","volume-title":"Privacy-preserving deep learning: a comprehensive survey","author":"Kwangjo","year":"2021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.51584\/IJRIAS.2025.10040003"},{"issue":"3","key":"ref29","first-page":"50","volume-title":"Regulation on Artificial Intelligence of the European Union (RIA)","volume":"6","year":"2024"},{"key":"ref30","article-title":"Federal Penal Code (CPF)","year":"2024","journal-title":"septies - 199 decies"},{"key":"ref31","year":"2025","journal-title":"Federal Law on the Protection of Personal Data Held by Private Parties (LFPDPPP)"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472089.pdf?arnumber=11472089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:57:58Z","timestamp":1776974278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472089","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}