Author:
Alabdulatif Abdulatif,Khalil Ibrahim,Yi Xun
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference32 articles.
1. R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, May 16–18, 2000, Dallas, Texas, USA, 2000, pp. 439–450.
2. Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption;Alabdulatif;J. Comput. System Sci.,2017
3. (Leveled) fully homomorphic encryption without bootstrapping;Brakerski,2012
4. Z. Brakerski, V. Vaikuntanathan, Fully homomorphic encryption from ring-LWE and security for key dependent messages, in: Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings, 2011, pp. 505–524.
5. A framework for real time end to end monitoring and big data oriented management of smart environments;Celesti;J. Parallel Distrib. Comput.,2019
Cited by
66 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献