共 47 条
[11]
Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
[12]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[14]
Anonymous usage of location-based services through spatial and temporal cloaking
[J].
PROCEEDINGS OF MOBISYS 2003,
2003,
:31-42
[15]
Halevi S., 2013, DESIGN IMPLEMENTATIO, P12
[16]
Hilbert D., 1891, Math. Annal., V38, P459, DOI [10.1007/BF01199431, DOI 10.1007/BF01199431]
[17]
Hossain A., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P358, DOI 10.1109/TrustCom.2012.193
[18]
Hossain A.-A, 2011, Proceedings of the 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE 2011). 11th International Symposium on Pervasive Systems, Algorithms, Networks (I-SPAN 2011). 10th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2011), P81, DOI 10.1109/CSE.2011.28
[19]
Hu Haibo., 2012, P ACM SIGMOD INT C M, P301
[20]
JAGADISH HV, 1990, SIGMOD REC, V19, P332, DOI 10.1145/93605.98742