共 26 条
[1]
[Anonymous], 2011, Extracting Value from Chaos
[2]
Bowen J.A., 2011, Computer Internet Lawyer, V28, P1
[3]
Chaudhuri S., 2012, P 2012 IEEE 28 INT C, DOI [10.1109/1CDE.2012.153, DOI 10.1109/1CDE.2012.153]
[4]
Authentication, Authorization and File Synchronization for Hybrid Cloud -- The Development Centric to Google Apps, Hadoop and Linux Local Hosts
[J].
JOURNAL OF INTERNET TECHNOLOGY,
2013, 14 (07)
:1141-1148
[5]
Ciriani V., 2007, K ANONYMITY, P323
[6]
Deyan Chen, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P647, DOI 10.1109/ICCSEE.2012.193
[8]
Gartner Inc, 2012, GARTN ID TOP 10 STRA
[9]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[10]
Hu Yuh-Jong, 2013, P 3 INT C WEB INT MI, DOI [10.1145/2479787.2479806, DOI 10.1145/2479787.2479806]