共 17 条
- [3] Gadepally Vijay, 2015, 2015 IEEE International Symposium on Technologies for Homeland Security (HST), P1, DOI 10.1109/THS.2015.7225312
- [4] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
- [5] Kanamori Sachiko, 2014, INF THEOR ITS APPL I, P26
- [6] Katal A, 2013, INT CONF CONTEMP, P404, DOI 10.1109/IC3.2013.6612229
- [7] Kepner J., 2014, High Performance Extreme Computing Conference, Computing on masked data: A high performance method for improving big data veracity, P1
- [8] Kepner Jeremy., 2015, 2015 IEEE High Performance Extreme Computing Conference (HPEC), P1
- [9] LANEY DOUGLAS, 2012, IMPORTANCE BIG DATA