Yayın: Efficient paillier cryptoprocessor for privacy‐preserving data mining
| dc.contributor.author | San, İsmail | |
| dc.contributor.author | Yakut, İbrahim | |
| dc.contributor.author | At, Nuray | |
| dc.contributor.author | Polat, Hüseyin | |
| dc.contributor.orcid | 0000-0003-3005-1813 | |
| dc.contributor.orcid | 0009-0005-1780-3605 | |
| dc.contributor.orcid | 0000-0003-4128-2625 | |
| dc.date.accessioned | 2025-11-13T09:59:52Z | |
| dc.date.issued | 2016-02-21 | |
| dc.identifier.doi | https://doi.org/10.1002/sec.1442 | |
| dc.identifier.endpage | 1546 | |
| dc.identifier.issn | 1939-0114 | |
| dc.identifier.issue | 11 | |
| dc.identifier.openalex | W2288359559 | |
| dc.identifier.startpage | 1535 | |
| dc.identifier.uri | https://hdl.handle.net/11421/2846 | |
| dc.identifier.uri | https://doi.org/10.1002/sec.1442 | |
| dc.identifier.volume | 9 | |
| dc.language.iso | en | |
| dc.relation.ispartof | Security and Communication Networks | |
| dc.rights | restrictedAccess | |
| dc.subject | Paillier cryptosystem | |
| dc.subject | Computer science | |
| dc.subject | Cryptosystem | |
| dc.subject | Homomorphic encryption | |
| dc.subject | Encryption | |
| dc.subject | Modular exponentiation | |
| dc.subject | Interleaving | |
| dc.subject | Scheme (mathematics) | |
| dc.subject | Computer security | |
| dc.subject | Hybrid cryptosystem | |
| dc.subject | Theoretical computer science | |
| dc.subject | Public-key cryptography | |
| dc.title | Efficient paillier cryptoprocessor for privacy‐preserving data mining | |
| dc.type | Article | |
| dspace.entity.type | Publication | |
| local.authorid.openalex | A5069831788 | |
| local.authorid.openalex | A5014173265 | |
| local.authorid.openalex | A5084052280 | |
| local.authorid.openalex | A5029891409 |
