-
5
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan. Fully homomorphic encryption over the integers. In Advances in Cryptology (EUROCRYPT'10), volume 6110 of LNCS , pages 24-43, 2010
-
(2010)
Advances in Cryptology (EUROCRYPT'10), Volume 6110 of LNCS
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
6
-
-
84908047971
-
Securing cloud-based computations against malicious providers
-
A. Bouti and J. Keller. Securing cloud-based computations against malicious providers. In SIGOPS Oper. Syst. Rev., Vol. 46, No. 2,pages 38-42, 2012
-
(2012)
SIGOPS Oper. Syst. Rev
, vol.46
, Issue.2
, pp. 38-42
-
-
Bouti, A.1
Keller, J.2
-
8
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. In Commun. ACM, Vol. 22 No.11, pages 612-613, 1979
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
9
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest and A. Shamir and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. In Commun. ACM, Vol. 26, pages 96-99, 1983
-
(1983)
Commun. ACM
, vol.26
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
13
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart and E. Tromer and H. Shacham and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proc. 16th ACM conference on Computer and communications security (CCS '09), pages 199-212, 2009
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security (CCS '09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
16
-
-
85026991166
-
RSA decryption techniques and the underlying mathematical concepts
-
H. Kamarulhaili and N. Basir. RSA Decryption Techniques and the underlying Mathematical concepts. In Int. J. of Cryptology Research, Vol. 1, No. 2, pages 165-177, 2009
-
(2009)
Int. J. of Cryptology Research
, vol.1
, Issue.2
, pp. 165-177
-
-
Kamarulhaili, H.1
Basir, N.2
-
23
-
-
84975551912
-
Low-Dimensional procedure for the characterization of human faces
-
L. Sirovich and M. Kirby. Low-Dimensional procedure for the characterization of human faces. In J. of the Optical Society of America, Vol. 4, pages 519524, 1987
-
(1987)
J. of the Optical Society of America
, vol.4
, pp. 519524
-
-
Sirovich, L.1
Kirby, M.2
-
24
-
-
0011921689
-
-
AT and T Laboratories Cambridge
-
The ORL Database of Faces. Available at. http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase. html, AT and T Laboratories Cambridge
-
The ORL Database of Faces
-
-
-
25
-
-
84913536910
-
Towards efficient privacy-preserving image feature extraction in cloud computing
-
Z. Qin, J. Yan, K. Ren, C.Chen, and C. Wang. Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing. In Proc. ACM Int. Conference on Multimedia (MM '14), Pages 497-506, 2014
-
(2014)
Proc. ACM Int. Conference on Multimedia (MM '14)
, pp. 497-506
-
-
Qin, Z.1
Yan, J.2
Ren, K.3
Chen, C.4
Wang, C.5
|