Author:
Portêlo José,Raj Bhiksha,Trancoso Isabel
Publisher
Public Library of Science (PLoS)
Reference39 articles.
1. Gentry C. A Fully Homomorphic Encryption Scheme. Ph.D. Thesis, Stanford University. 2009. Available: http://crypto.stanford.edu/craig/craig-thesis.pdf.
2. Advances in Cryptology—CRYPTO 2011;J-S Coron,2011
3. Advances in Cryptology—EUROCRYPT 2010;M van Dijk,2010
4. Yao A. Protocols for Secure Computation (Extended Abstract). FOCS 1982: Proceedings of the IEEE Symposium on Foundations of Computer Science; 1982 Nov 3–5; Chicago, IL, USA. 1982. p.160–164. doi: 10.1109/SFCS.1982.38
5. Secure Multiparty Computation for Privacy-Preserving Data Mining;Y Lindell;Journal of Privacy and Confidentiality,2009
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Preserving privacy in speaker and speech characterisation;Computer Speech & Language;2019-11
2. SHIELD;Proceedings of the 34th Annual Computer Security Applications Conference;2018-12-03
3. Privacy-Preserving HMM Forward Computation;Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy;2017-03-22