共 50 条
- [32] Secure Teleoperation Control Using Somewhat Homomorphic Encryption IFAC PAPERSONLINE, 2022, 55 (37): : 593 - 600
- [33] Challenges of Using Homomorphic Encryption to Secure Cloud Computing 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 343 - 349
- [34] Secure Signal Processing Using Fully Homomorphic Encryption ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEMS, ACIVS 2015, 2015, 9386 : 93 - 104
- [35] Performance of Secure Network Coding based on Homomorphic Encryption 2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 670 - 672
- [37] Secure matrix multiplication based on fully homomorphic encryption The Journal of Supercomputing, 2023, 79 : 5064 - 5085
- [38] SoK: Towards CCA Secure Fully Homomorphic Encryption PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 793 - 798
- [39] Secure Relative Detection in (Forensic) Database with Homomorphic Encryption BIOINFORMATICS RESEARCH AND APPLICATIONS, PT II, ISBRA 2024, 2024, 14955 : 410 - 422
- [40] A Secure Database System using Homomorphic Encryption Schemes DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58