共 21 条
- [1] Yao A.C., Protocols for secure computations, Proc. of the 23rd IEEE Symp. on Foundations of Computer Science, pp. 160-164, (1982)
- [2] Freudiger J., Rane S., Brito A.E., Uzun E., Privacy preserving data quality assessment for high-fidelity data sharing, Proc. of the ACM Workshop on Information Sharing & Collaborative Security, pp. 21-29, (2014)
- [3] Li X.Y., Jung T., Search me if you can: Privacy-Preserving location query service, Proc. of the IEEE INFOCOM 2013, pp. 2760-2768, (2013)
- [4] Yang J., Zhao J.S., Zhang J.P., A privacy preservation method for high dimension data mining, Acta Electronica Sinica, 41, 11, pp. 2187-2192, (2013)
- [5] Samanthula B.K., Elmehdwi Y., Howser G., Madria S., A secure data sharing and query processing framework via federation of cloud computing, Information Systems, 48, pp. 196-212, (2015)
- [6] Kerschbaum F., Privacy-Preserving computation, Proc. of the Annual Privacy Forum, pp. 41-54, (2014)
- [7] Boneh D., Waters B., Conjunctive, subset, and range queries on encrypted data, Proc. of the Theory of Cryptography, pp. 535-554, (2007)
- [8] Guo F., Mu Y., Willy S., Subset membership encryption and its applications to oblivious transfer, IEEE Trans. on Information Forensics & Security, 9, 7, pp. 1098-1107, (2014)
- [9] Sahai A., Waters B., Fuzzy identity-based encryption, Proc. of the Cryptology-EuroCrypt 2005, pp. 457-473, (2005)
- [10] Li S.D., Si T.G., Dai Y.Q., Secure multi-party computation about set-inclusion graph-inclusion, Journal of Computation Research and Development, 42, 10, (2005)