Author:
Ghunaim Tasneem,Kamel Ibrahim,Al Aghbari Zaher
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference39 articles.
1. Liu Z, Choo KKR, Zhao M (2017) Practical-oriented protocols for privacy-preserving outsourced big data analysis: challenges and future research directions. Comput Secur. https://doi.org/10.1016/j.cose.2016.12.006
2. Hashim A (2020) Sina Weibo suffered data breach exposing 538 million records now on sale. https://latesthackingnews.com/2020/03/24/sina-weibo-suffered-data-breach-exposing-538-million-records-now-on-sale/#:~:text=SinaWeiboDataBreachReportedly%2CChinesesiteSina,Shu%29%2CCTOMoresec%2CpostedaboutitonWeibo. Accessed 13 Feb 2021
3. CBSNewYork (2020) Data breach. CBSNewYork
4. Bohli JM, Gruschka N, Jensen M et al (2013) Security and privacy-enhancing multicloud architectures. IEEE Trans Dependable Secure Comput 10:212–224. https://doi.org/10.1109/TDSC.2013.6
5. Schoenmakers B (2011) Homomorphic encryption. In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, Boston
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献