共 32 条
[2]
[Anonymous], P INT WORKSH INF SEC
[3]
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[6]
Brinkman R., P WORKSH SEC DAT MAN, V2011, P114
[7]
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[9]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[10]
Secure conjunctive keyword search over encrypted data
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS,
2004, 3089
:31-45