USING MACHINE LEARNING ON ENCRYPTED DATA
Catalin Emanuel Ciobota ()
Additional contact information
Catalin Emanuel Ciobota: Valahia University, Romania
Journal of Information Systems & Operations Management, 2021, vol. 15, issue 1, 66-80
Abstract:
This post discusses cutting-edge cryptography techniques. Do not use examples in this blog post for production applications. Always consult a professional cryptographer before using cryptography. In the following lines we will discuss data encryption techniques using advanced encryption techniques. The examples presented are not recommended for use in production applications. Before applying encryption to data applied to the services of a professional.
Date: 2021
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.rebe.rau.ro/RePEc/rau/jisomg/SU21/JISOM-SU21-A06.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:rau:jisomg:v:15:y:2021:i:1:p:66-80
Access Statistics for this article
More articles in Journal of Information Systems & Operations Management from Romanian-American University Contact information at EDIRC.
Bibliographic data for series maintained by Alex Tabusca ().