Author:
Renuka Devi K.,Nithyapriya S.,Pradeep G.,Menaha R.,Suganyadevi S.
Publisher
Springer International Publishing
Reference51 articles.
1. A. C. Santha Sheela and Ramya. G. Franklin, “E-Voting System Using Homomorphic Encryption Technique,” International Conference on Mathematical Sciences (ICMS 2020) 4–6 March 2020, Chennai, India, vol. 1770, no. 1, 2020.
2. Archer, David & Chen, Lily & Cheon, Jung & Gilad-Bachrach, Ran & Hallman, Roger & Huang, Zhicong & Jiang, Xiaoqian & Kumaresan, Ranjit & Malin, Bradley & Sofia, Heidi & Song, Yongsoo & Wang, Shuang, “Applications of Homomorphic Encryption,” 2017.
3. Ciocan, S. Costea and N. Ţăpuş, “Implementation and optimization of a somewhat homomorphic encryption scheme,” 2015 14th RoEduNet International Conference - Networking in Education and Research (RoEduNet NER), pp. 198–202, 2015.
4. El-Yahyaoui and M. D. Ech-Chrif El Kettani, “A verifiable fully homomorphic encryption scheme to secure big data in cloud computing,” 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1–5, 2017.
5. Craig Gentry, “Fully homomorphic encryption using ideal lattices,” In Proceedings of the forty-first annual ACM symposium on Theory of computing (STOC ‘09), Association for Computing Machinery, New York, NY, USA, pp. 169–178, 2009.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Employing Cryptographic Techniques for Data Security and Privacy Preservation;Transactions on Computer Science and Intelligent Systems Research;2024-08-12