共 22 条
[1]
[Anonymous], 2012, LNCS, DOI DOI 10.1007/978-3-642-29860-8
[2]
[Anonymous], FORECAST CONSUMER DI
[3]
[Anonymous], P WPES
[5]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]
De Capitani di Vimercati S., 2010, Proceedings 2010 30th International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), P42, DOI 10.1109/ICDCSW.2010.35
[7]
Di Vimercati S.D.C., 2014, SECURE CLOUD COMPUTI, P123
[8]
Encryption Policies for Regulating Access to Outsourced Data
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
2010, 35 (02)
[9]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[10]
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418