1. Tebaa, M.; El Hajji, S.; El Ghazi, A., “Homomorphic encryption method applied to Cloud Computing,” in Network Security and Systems (JNS2), 2012 National Days of, vol., no., pp.86-89, 20-21 April 2012.
2. Mather, Tim, Subra Kumaraswamy, and Shahed Latif. Cloud security and privacy: an enterprise perspective on risks and compliance. “O’Reilly Media, Inc.”, 2009.
3. Samyak Shah, Yash Shah, Janika Kotak, “Somewhat Homomorphic Encryption Technique with its Key Management Protocol”, Dec 14 Volume 2 Issue 12, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 4180-4183.
4. Ramaiah, Y. Govinda, and G. Vijaya Kumari. “Efficient public key homomorphic encryption over integer plaintexts.” Information Security and Intelligence Control (ISIC), 2012 International Conference on. IEEE, 2012.
5. Gentry, Craig. “Computing arbitrary functions of encrypted data.” Communications of the ACM 53.3 (2010): 97-105.