Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix

Author(s):  
Chinmoy Biswas ◽  
Ratna Dutta
2020 ◽  
Vol 29 (2) ◽  
pp. 206-217
Author(s):  
Jianyuan Ni ◽  
Monica L. Bellon-Harn ◽  
Jiang Zhang ◽  
Yueqing Li ◽  
Vinaya Manchaiah

Objective The objective of the study was to examine specific patterns of Twitter usage using common reference to tinnitus. Method The study used cross-sectional analysis of data generated from Twitter data. Twitter content, language, reach, users, accounts, temporal trends, and social networks were examined. Results Around 70,000 tweets were identified and analyzed from May to October 2018. Of the 100 most active Twitter accounts, organizations owned 52%, individuals owned 44%, and 4% of the accounts were unknown. Commercial/for-profit and nonprofit organizations were the most common organization account owners (i.e., 26% and 16%, respectively). Seven unique tweets were identified with a reach of over 400 Twitter users. The greatest reach exceeded 2,000 users. Temporal analysis identified retweet outliers (> 200 retweets per hour) that corresponded to a widely publicized event involving the response of a Twitter user to another user's joke. Content analysis indicated that Twitter is a platform that primarily functions to advocate, share personal experiences, or share information about management of tinnitus rather than to provide social support and build relationships. Conclusions Twitter accounts owned by organizations outnumbered individual accounts, and commercial/for-profit user accounts were the most frequently active organization account type. Analyses of social media use can be helpful in discovering issues of interest to the tinnitus community as well as determining which users and organizations are dominating social network conversations.


2019 ◽  
Vol 7 (4) ◽  
pp. 220-224
Author(s):  
J.Lenin . ◽  
B. Sundaravadivazhagan ◽  
M. Sulthan Ibrahim
Keyword(s):  

Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2019 ◽  
Author(s):  
Ira Nath ◽  
Renesha Ghosh ◽  
Sourav Ghosh ◽  
Pranati Rakshit ◽  
Dharmpal Singh

2019 ◽  
Author(s):  
Ira Nath ◽  
Pranati Rakshit ◽  
Renesha Ghosh ◽  
Sourav Ghosh ◽  
Dharmpal Singh

Author(s):  
Khosi Kubeka ◽  
Sharmla Rama

Combining the theories of intersectionality and social exclusion holds the potential for structural and nuanced interpretations of the workings of power, taking systemic issues seriously but interpreting them though social relations that appear in local contexts. An intersectional analysis of social exclusion demonstrates to what extent multiple axes of social division—be they race, age, gender, class, disability or citizenship—intersect to result in unequal and disparate experiences for groups of youth spatially located in particular communities and neighborhoods. A common reference point is therefore power and how it manifests at the intersection of the local and global. A South African case study is used to explore the subjective measures and qualitative experiences of intersectionality and social exclusion further. The unique ways that language intersects with space, neighborhood, and race in the South African context, enables opportunities in education and the labor market, with profound implications for forms of social exclusion.


Sign in / Sign up

Export Citation Format

Share Document