共 45 条
[21]
Chen XF, 2014, LECT NOTES COMPUT SC, V8712, P148, DOI 10.1007/978-3-319-11203-9_9
[22]
Cloud9, 2011, YOUR DEV ENV CLOUD
[23]
Codeanywhere, 2011, ONL COD ED
[24]
Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
[25]
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
[26]
eXo Cloud IDE, 2002, ONL COD ED
[27]
Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
[28]
Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
[29]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[30]
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584