1. Sha P, Zhu Z (2016) The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing. In: 2016 4th international conference on cloud computing and intelligence systems, Beijing, pp 388–392
2. Gentry C, Groth J, Ishai Y, Peikert C, Sahai A, Smith A (2014) Using fully homomorphic hybrid encryption to minimize non-iterative zero-knowledge proofs. J Cryptol 28(4):820–843
3. Togan M, Pleşca C (2014) Comparison-based computations over fully homomorphic encrypted data. In: 2014 10th international conference on communications, Bucharest, pp 1–6
4. Kumar N, Sharma S (2013) Study of intrusion detection system for DDoS attacks in cloud computing. In: 2013 tenth international conference on wireless and optical communications networks (WOCN), Bhopal, pp 1–5
5. Bharati M, Tamane S (2017) Intrusion detection systems (IDS) & future challenges in cloud based environment. In: 2017 1st international conference on intelligent systems and information management (ICISIM), Aurangabad, pp 240–250