-
1
-
-
0023408117
-
Processing encrypted data
-
Sept
-
N. Ahituv, Y. Lapid and S. Neumann, “Processing encrypted data”, Communications of the ACM, vol. 20, no. 9, pp. 777–780, Sept. 1987.
-
(1987)
Communications of the ACM
, vol.20
, Issue.9
, pp. 777-780
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
2
-
-
84937395634
-
A database encryption scheme which allows the computation of statistics using encrypted data
-
New York: IEEE CS Press
-
G. R. Blakley and C. Meadows, “A database encryption scheme which allows the computation of statistics using encrypted data”, in Proceedings of the IEEE Symposium on Research in Security and Privacy. New York: IEEE CS Press, 1985, pp. 116–122.
-
(1985)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 116-122
-
-
Blakley, G.R.1
Meadows, C.2
-
3
-
-
85034827254
-
On privacy homomorphisms
-
D. Chaum and W. L. Price, Eds. Berlin: Springer-Verlag
-
E. F. Brickell and Y. Yacobi, “On privacy homomorphisms”, in Advances in Cryptology-Eurocrypt’87, D. Chaum and W. L. Price, Eds. Berlin: Springer-Verlag, 1988, pp. 117–125.
-
(1988)
Advances in Cryptology-Eurocrypt’87
, pp. 117-125
-
-
Brickell, E.F.1
Yacobi, Y.2
-
4
-
-
0030577321
-
A new privacy homomorphism and applications
-
Dec
-
J. Domingo-Ferrer, “A new privacy homomorphism and applications”, Information Processing Letters, vol. 60, no. 5, pp. 277–282, Dec. 1996.
-
(1996)
Information Processing Letters
, vol.60
, Issue.5
, pp. 277-282
-
-
Domingo-Ferrer, J.1
-
5
-
-
0031176117
-
Multi-application smart cards and encrypted data processing
-
Jun
-
J. Domingo-Ferrer, “Multi-application smart cards and encrypted data processing”, Future Generation Computer Systems, vol. 13, pp. 65–74, Jun. 1997.
-
(1997)
Future Generation Computer Systems
, vol.13
, pp. 65-74
-
-
Domingo-Ferrer, J.1
-
6
-
-
84945284421
-
An implementable scheme for secure delegation of statistical data
-
Y. Han, T. Okamoto and S. Qing, Eds. Berlin: Springer-Verlag
-
J. Domingo-Ferrer and R. X. Sánchez del Castillo, “An implementable scheme for secure delegation of statistical data”, in Information Security-ICICS’97, Lecture Notes in Computer Science 1334, Y. Han, T. Okamoto and S. Qing, Eds. Berlin: Springer-Verlag, 1997, pp. 445–451.
-
(1997)
Information Security-ICICS’97, Lecture Notes in Computer Science 1334
, pp. 445-451
-
-
Domingo-Ferrer, J.1
del Castillo, R.X.S.2
-
8
-
-
17144400054
-
Open questions, talk abstracts, and summary of discussions
-
J. Feigenbaum and M. Merritt, “Open questions, talk abstracts, and summary of discussions”, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 2, pp. 1–45, 1991.
-
(1991)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.2
, pp. 1-45
-
-
Feigenbaum, J.1
Merritt, M.2
-
10
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. A. DeMillo et al., Eds. New-York: Academic Press
-
R. L. Rivest, L. Adleman and M. L. Dertouzos, “On data banks and privacy homomorphisms”, in Foundations of Secure Computation, R. A. DeMillo et al., Eds. New-York: Academic Press, 1978, pp. 169-179.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
11
-
-
84972540003
-
Approximate formulas for some functions of prime numbers
-
J. B. Rosser and L. Schoenfeld, “Approximate formulas for some functions of prime numbers”, Illinois Journal of Mathematics, vol. 6, no. 1, pp. 64–94, Jan. 1962.
-
(1962)
Illinois Journal of Mathematics
, vol.6
, Issue.1
, pp. 64-94
-
-
Rosser, J.B.1
Schoenfeld, L.2
-
14
-
-
84945279111
-
-
SCYTL Online World Security. http://www.scytl.com
-
-
-
|