共 30 条
- [1] [Anonymous], 2011, P NETW DISTR SYST SE
- [2] BARNI M, 2010, P 12 ACM WORKSH MULT, P231
- [3] Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
- [4] Bogetoft P, 2009, LECT NOTES COMPUT SC, V5628, P325, DOI 10.1007/978-3-642-03549-4_20
- [5] Bringer J., 2012, 2012 5th IAPR International Conference on Biometrics (ICB), P257, DOI 10.1109/ICB.2012.6199817
- [6] Bringer J., P 4 IEEE INT C BIOM
- [8] Erkin Z, 2009, LECT NOTES COMPUT SC, V5672, P235, DOI 10.1007/978-3-642-03168-7_14
- [9] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
- [10] Hazay C, 2010, INFORM SEC CRYPT TEX, P3, DOI 10.1007/978-3-642-14303-8