Author:
Breuer Peter T.,Bowen Jonathan P.
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Breuer, P.T.: Encrypted Data Processing. Patent pending, UK Patent Office #GB1120531.7. UK (November 2011)
2. Lecture Notes in Computer Science;P.T. Breuer,2012
3. Lecture Notes in Computer Science;R. Buchty,2004
4. Duc, G., Keryell, R.: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection. In: ACSAC 2006, Proceedings of the 22nd Annual Computer Security Applications Conference, Miami Beach, FL, USA, pp. 483–492. IEEE Computer Society, Washington, DC (2006), ISBN:0-7695-2716-7, doi:10.1109/ACSAC.2006.21
5. Gentry, C.: Fully Homomorphic Encryption Using Ideal Lattices. In: Proc. 41st ACM Symposium on Theory of Computing, pp. 169–178. ACM (2009) doi: 10.1145/1536414.1536440, ISBN: 978-1-60558-506-2
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy-Preserving Computation: Doomed to Succeed;Computer;2022-08
2. A Calculus of Chaos in Stochastic Compilation;Lecture Notes in Computer Science;2020
3. Safe Compilation for Hidden Deterministic Hardware Aliasing;2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW);2019-10
4. Superscalar Encrypted RISC: The Measure of a Secret Computer;2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE);2018-08
5. The Secret Processor Will Go to the Ball: Benchmark Insider-Proof Encrypted Computing;2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2018-04