Author:
Walunj Vishal Satish,Gupta Praveen,Parvat Thaksen J.
Publisher
Springer Nature Singapore
Reference15 articles.
1. Dov Gordon S, Katz J, Liu F-H (2015) Computation for Multiple Clients with Stronger Security Guarantees. In: Dodis Y, Nelsen JB (eds) TCC 2015, Part II, LNCS 9015. International Association for Cryptologic Research, pp 144–168
2. Natth S, Venkatesan R (2009) Grouped aggregate queries on outsourced data streams that are publicly verifiable. Database Syst Trans ACM (TODS) 34(3):1–42
3. Nath S, Venkatesan R (2012) Publicly verifiable grouped aggregation queries on outsourced data streams. In: International conference on data engineering. IEEE, pp 517–528
4. Catalano D, Fiore D (2013) Practical homomorphic macs for arithmetic circuits. In: Advances in cryptology–EUROCRYPT. Springer, pp 336–352
5. Gennaro R, Wichs D (2013) Fully homomorphic message authenticators. In Advances in cryptology-ASIACRYPT. Springer, pp 301–320