Author:
Duan Guohao,Ma Siyuan,Wen Yanlong
Publisher
Springer Nature Singapore
Reference16 articles.
1. Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 644–655 (2015)
2. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. 9(3–4), 211–407 (2014)
3. Zhang, Z., Yan, J., Liu, S., et al.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26–31. IEEE (2012)
4. Cui, S., Song, X., Asghar, M.R., et al.: Privacy-preserving dynamic symmetric searchable encryption with controllable leakage. ACM Trans. Priv. Secur. (TOPS) 24(3), 1–35 (2021)
5. Kadykov, V., Levina, A., Voznesensky, A.: Homomorphic encryption within lattice-based encryption system. Procedia Comput. Sci. 186, 309–315 (2021)