000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250606b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783031654930 |
Terms of availability |
(hbk) |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
ADI |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Adir, Allon |
245 ## - TITLE STATEMENT |
Title |
Homomorphic encryption for data science (HE4DS) |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
springer, |
Date of publication, distribution, etc |
2024 |
Place of publication, distribution, etc |
Cham : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 304 p. ; |
Other physical details |
ill., (some col.), |
Dimensions |
25 cm |
365 ## - TRADE PRICE |
Price amount |
74.99 |
Price type code |
€ |
Unit of pricing |
100.40 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications. The authors present various techniques to leverage the unique features of FHE and to overcome its characteristic limitations. Specifically, this book summarizes polynomial approximation techniques used by FHE applications and various data packing schemes based on a data structure called tile tensors, and demonstrates how to use the studied techniques in several specific privacy preserving applications. Examples and exercises are also included throughout this book. The proliferation of practical FHE technology has triggered a wide interest in the field and a common wish to experience and understand it. This book aims to simplify the FHE world for those who are interested in privacy preserving data science tasks, and for an audience that does not necessarily have a deep cryptographic background, including undergraduate and graduate-level students in computer science, and data scientists who plan to work on private data and models. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption |
|
Topical term or geographic name as entry element |
Computer science |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Aharoni, Ehud |
|
Personal name |
Drucker, Nir |
|
Personal name |
Levy, Ronen |
|
Personal name |
Shaul, Hayim |
|
Personal name |
Soceanu, Omri |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |