共 15 条
[1]
Coron JS, 2011, LECT NOTES COMPUT SC, V6841, P487, DOI 10.1007/978-3-642-22792-9_28
[2]
Frenzel Christoph, 2013, Theory, Practice, and Applications of Rules on the Web. 7th International Symposium, RuleML 2013. Proceedings. LNCS 8035, P84, DOI 10.1007/978-3-642-39617-5_11
[3]
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
[J].
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011),
2011,
:107-116
[4]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[5]
Hamdi M., 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS), P1, DOI 10.1109/CTS.2012.6261019
[6]
Kim J., 2013, IACR CRYPTOLOGY EPRI, V2013, P57
[7]
Lei F, 2010, CLOUD COMPUTING APPL, P388
[8]
Mansor A A, 2014, INT J INNOV COMPUT I, V4, P41
[9]
Mather Tim, 2011, CLOUD SECURITY PRIVA
[10]
Mell P., 2011, NIST SPECIAL PUBLICA, V800-145