Author:
Damgård Ivan,Jakobsen Thomas P.,Nielsen Jesper Buus,Pagter Jakob I.
Publisher
Springer Berlin Heidelberg
Reference42 articles.
1. Lecture Notes in Computer Science;J.F. Almansa,2006
2. Lecture Notes in Computer Science;N. Alon,2000
3. Blakely, G.R.: Safeguarding cryptographic keys. National Computer Conference Proceedings A.F.I.P.S 48, 313–317 (1979)
4. Lecture Notes in Computer Science;P. Bogetoft,2009
5. Brakerski, Z., Gentry, C., Vaikuntanathan, V. (Leveled) fully homomorphic encryption without bootstrapping. In: Goldwasser, S. (ed.) ITCS, pp. 309–325. ACM (2012)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Data Transfer onto Cloud Environment using Diffie-Hellman Key Exchange Algorithm;2024 International Conference on Inventive Computation Technologies (ICICT);2024-04-24
2. Flexible and Survivable Single Sign-On;Cyberspace Safety and Security;2022
3. Secure File Storage on Cloud using Hybrid Cryptography;2021 5th International Conference on Information Systems and Computer Networks (ISCON);2021-10-22
4. Flowrider: Fast On-Demand Key Provisioning for Cloud Networks;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2021
5. A Framework for Security Management in Cloud Based on Quantum Cryptography;Advances in Intelligent Systems and Computing;2019