Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference43 articles.
1. Adjedj M, Bringer J, Chabanne H, Kindarji B (2009) Biometric identification over encrypted data made feasible. In: Information systems security. Springer, Berlin, pp 86–100
2. Alguliev R, Aliguliyev R (2007) Experimental investigating the F-measure as similarity measure for automatic text summarization. Appl Comput Math 6:278–287
3. Aljammal AH, Manasrah AM, Abdallah AE, Tahat NM (2017) A new architecture of cloud computing to enhance the load balancing. Int J Bus Inf Syst 25:393–405
4. Bache K, Lichman M (2013) UCI machine learning repository.
http://archive.ics.uci.edu/ml
5. Bellare M, Boldyreva A, O’Neill A (2007) Deterministic and efficiently searchable encryption. In: Advances in cryptology—CRYPTO 2007. Springer, Berlin, pp 535–552
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献