共 38 条
- [11] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
- [12] He YY, 2011, PROC INT CONF DATA, P529, DOI 10.1109/ICDE.2011.5767924
- [13] Kienzler R., 2012, Proceedings of the 2012 IEEE International Conference on Data Engineering Workshops (ICDEW 2012), P159, DOI 10.1109/ICDEW.2012.69
- [14] LeFevre K., 2005, Multidimensional k-Anonymity
- [15] LeFevre Kristen., 2005, Incognito: Efficient full-domain k-anonymity
- [16] Periodic solutions for a singular damped differential equation [J]. BOUNDARY VALUE PROBLEMS, 2015,
- [17] Authorized Private Keyword Search over Encrypted Data in Cloud Computing [J]. 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 383 - 392
- [19] Machanavajjhala A., 2007, ACM T KNOWL DISCOV D, V1, P3, DOI [DOI 10.1145/1217299.1217302, 10.1145/1217299.1217302]
- [20] Manousakis V, 2013, LECT NOTES BUS INF P, V148, P455