共 22 条
[1]
[Anonymous], 2016, ARXIV160908326CSLG
[2]
[Anonymous], 2008, PSD
[3]
[Anonymous], 2009, FDN CRYPTOGRAPHY
[4]
Proxy Re-Encryption Based on Homomorphic Encryption
[J].
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017),
2017,
:154-161
[5]
Bellafqira R, 2016, IEEE ENG MED BIO, P2537, DOI 10.1109/EMBC.2016.7591247
[6]
Bellafqira R, 2015, IEEE ENG MED BIO, P2944, DOI 10.1109/EMBC.2015.7319009
[7]
Machine Learning Classification over Encrypted Data
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[8]
Bouslimi D, 2016, IEEE ENG MED BIO, P2496, DOI 10.1109/EMBC.2016.7591237
[10]
Chabanne H., 2017, IACR CRYPTOLOGY EPRI, V2017, P35