共 23 条
[2]
BEST R., 1980, Proceedings of the IEEE Spring Compcon, P466
[3]
BHATTACHARJEE B, 2006, DAMON 06
[4]
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[6]
Garfinkel T., 2003, P 19 ACM S OP SYST P, P14, DOI 10.1145/945445.945464
[7]
GELMANN R, 2009, WPF REPORT PRIVACY C
[8]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[9]
GUILLOU LC, 1992, CONT CRYPTOLOGY SCI
[10]
Gutmann P, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, P97