共 23 条
[1]
[Anonymous], 2012, IACR CRYPTOLOGY EPRI
[2]
Ateniese G., 2004, ACM Transactions on Information and Systems Security, V7, P1, DOI 10.1145/984334.984335
[3]
Baharon MR, 2013, ANN CONF PRIV SECUR, P82, DOI 10.1109/PST.2013.6596040
[5]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[7]
Mobile cloud computing: A survey
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (01)
:84-106
[8]
Homomorphic Evaluation of the AES Circuit
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2012,
2012, 7417
:850-867
[9]
Itani W., 2010, 2010 INT C EN AW COM, P26
[10]
Towards secure mobile cloud computing: A survey
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (05)
:1278-1299