2023 | Decision Support Systems | Citations: 0
Authors: He, Haoran; Wang, Zhao; Jain, Hemant; Jiang, Cuiqing; Yang, Shanlin
Abstract: With society's wide-scale adoption of information technology, significant inform ... Expand
Semantic filters: homomorphic encryption
Topics: privacy homomorphic encryption logistics management online lending missing data
Methods: computational algorithm machine learning federated learning logistic regression experiment
2021 | European Conference On Information Systems | Citations: 0
Authors: Agahari, Wirawan; Dolci, Riccardo; Reuver, Mark de
Abstract: Privacy-preserving technologies could allow data marketplaces to deliver techni ... Expand
Semantic filters: homomorphic encryption
Topics: privacy business model value creation peer-to-peer model digital platform
Methods: qualitative interview qualitative coding design artifact archival research experiment
2021 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Wang, Qin; Chen, Shiping; Xiang, Yang
Abstract: Blockchain records transactions with various protection techniques against tampe ... Expand
Semantic filters: homomorphic encryption
Topics: anonymity data encryption public key encryption blockchain privacy
Methods: computational algorithm experiment design artifact literature study simulation
2020 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Mehrotra, Sharad; Sharma, Shantanu; Ullman, Jeffrey D.; Ghosh, Dhrubajyoti; Gupta, Peeyush; Mishra, Anurag
Abstract: Despite extensive research on cryptography, secure and efficient query processin ... Expand
Semantic filters: homomorphic encryption
Topics: data security data encryption cloud computing data breach outsourcing
Methods: computational algorithm design artifact experiment
2019 | Information Systems Frontiers | Citations: 9
Authors: Lee, Cheng-Chi; Li, Chun-Ta; Cheng, Chung-Lun; Lai, Yan-Ming; Vasilakos, Athanasios V.
Abstract: In recent years, Radio Frequency Identification (RFID) applications of various k ... Expand
Semantic filters: homomorphic encryption
Topics: electronic authentication radio frequency identification homomorphic encryption authorization privacy
Methods: literature study
2015 | International Conference on Information Systems | Citations: 0
Authors: Bhattacharya, Prasanta; Phan, Tuan; Liu, Linlin
Abstract: Data is becoming increasingly valuable, but concerns over its security and priva ... Expand
Semantic filters: homomorphic encryption
Topics: data encryption privacy public key encryption peer-to-peer model homomorphic encryption
Methods: logistic regression simulation design artifact conceptual modelling design science
2011 | International Conference on Information Systems | Citations: 0
Authors: Kerschbaum, Florian; StrÃ, Jens
Abstract: The pressure on enterprises to manage and improve their environmental sustainabi ... Expand
Semantic filters: homomorphic encryption
Topics: data encryption supply chain management enterprise resource planning homomorphic encryption public key encryption
Methods: design artifact experiment company material computational algorithm data envelopment analysis
2011 | Business & Information Systems Engineering | Citations: 0
Authors: Kerschbaum, Florian
Abstract: Cloud computing entails a novel security threat: The cloud service provider is ... Expand
Semantic filters: homomorphic encryption
Topics: cloud computing homomorphic encryption Java data encryption web service
Methods: experiment cluster analysis computational algorithm time series analysis longitudinal research
2007 | Americas Conference on Information Systems | Citations: 0
Authors: Post, Gerald
Abstract: The current political climate has almost ruled out the use of Internet voting. M ... Expand
Semantic filters: homomorphic encryption
Topics: spyware homomorphic encryption