-
1
-
-
80054780094
-
Conceptualizing smart city with dimensions of technology, people, and institutions
-
T. Nam and T. A. Pardo, “Conceptualizing smart city with dimensions of technology, people, and institutions,” in Proceedings of the 12th Annual International Digital Government Research Conference on Digital Government Innovation in Challenging Times, 2011, pp. 282-291.
-
(2011)
Proceedings of The 12th Annual International Digital Government Research Conference on Digital Government Innovation in Challenging Times
, pp. 282-291
-
-
Nam, T.1
Pardo, T.A.2
-
2
-
-
85002901195
-
Towards a federation of smart city services
-
J. A. C. Soto, O. Werner-Kytölä, and M. Jahn et al., “Towards a federation of smart city services,” in Proceedings of International Conference on Recent Advances in Computer Systems, 2015, pp. 163-168.
-
(2015)
Proceedings of International Conference on Recent Advances in Computer Systems
, pp. 163-168
-
-
Soto, J.A.C.1
Werner-Kytölä, O.2
Jahn, M.3
-
3
-
-
84988425564
-
On emerging family of elliptic curves to secure internet of things: ECC comes of age
-
Z. Liu, and X. Huang, Z. Hu, M. K. Khan, H. Seo, and L. Zhou, “On emerging family of elliptic curves to secure internet of things: ECC comes of age,” IEEE Transactions on Dependable and Secure Computing, Vol. 99, 2016, pp. 3301-3310.
-
(2016)
IEEE Transactions on Dependable and Secure Computing
, vol.99
, pp. 3301-3310
-
-
Liu, Z.1
Huang, X.2
Hu, Z.3
Khan, M.K.4
Seo, H.5
Zhou, L.6
-
4
-
-
84959050879
-
Designing a smart city internet of things platform with microservice architecture
-
A. Krylovskiy, M. Jahn, and E. Patti, “Designing a smart city internet of things platform with microservice architecture,” in Proceedings of the 3rd Future Internet of Things and Cloud, 2015, pp. 25-30.
-
(2015)
Proceedings of The 3rd Future Internet of Things and Cloud
, pp. 25-30
-
-
Krylovskiy, A.1
Jahn, M.2
Patti, E.3
-
5
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, Vol. E98-B, 2015, pp. 190-200.
-
(2015)
IEICE Transactions on Communications
, vol.E98-B
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
6
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, Vol. 16, 2015, pp. 317-323.
-
(2015)
Journal of Internet Technology
, vol.16
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
7
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2015, pp. 340-352.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.27
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
8
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, DOI: 10.1109/TPDS.2015.2506573, 2015.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
11
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. L. Rivest, L. Adlman, and M. L. Dertouzos, “On data banks and privacy homomorphisms,” Foundations of Secure Computation, Vol. 4, 1978, pp. 169-180.
-
(1978)
Foundations of Secure Computation
, vol.4
, pp. 169-180
-
-
Rivest, R.L.1
Adlman, L.2
Dertouzos, M.L.3
-
13
-
-
77649240581
-
Computing on arbitrary functions of encrypted data
-
C. Gentry, “Computing on arbitrary functions of encrypted data,” Communications of the ACM, Vol. 53, 2010, pp. 97-105.
-
(2010)
Communications of The ACM
, vol.53
, pp. 97-105
-
-
Gentry, C.1
-
14
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
M. van Dijk, C. Gentry, S. Halevi, et al., “Fully homomorphic encryption over the integers,” in Proceedings of the 29th International Conference on Theory and Application of Cryptographic Techniques, 2010, pp. 24-43.
-
(2010)
Proceedings of The 29th International Conference on Theory and Application of Cryptographic Techniques
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
-
17
-
-
84888634213
-
Fully homomorphic encryption using hidden ideal lattice
-
T. Plantard, W. Susilo, and Z. Zhang, “Fully homomorphic encryption using hidden ideal lattice,” IEEE Transactions on Information Forensics and Security, Vol. 8, 2013, pp. 2127-2137.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, pp. 2127-2137
-
-
Plantard, T.1
Susilo, W.2
Zhang, Z.3
-
18
-
-
84883356524
-
Batch fully homomorphic encryption over the integers
-
J. Cheon, J. S. Coron, J. Kim, et al., “Batch fully homomorphic encryption over the integers,” in Proceedings of the 32nd International Conference on Theory and Application of Cryptographic, 2013, pp. 315-335.
-
(2013)
Proceedings of The 32nd International Conference on Theory and Application of Cryptographic
, pp. 315-335
-
-
Cheon, J.1
Coron, J.S.2
Kim, J.3
-
19
-
-
84958553141
-
Scale-invariant fully homomorphic encryption over the integers
-
J. S. Coron, T. Lepoint, and M. Tibouchi, “Scale-invariant fully homomorphic encryption over the integers,” in Proceedings of the 17th International Conference on Practice and Theory in Public Key Cryptography, 2014, pp. 311-328.
-
(2014)
Proceedings of The 17th International Conference on Practice and Theory in Public Key Cryptography
, pp. 311-328
-
-
Coron, J.S.1
Lepoint, T.2
Tibouchi, M.3
-
20
-
-
84926687996
-
CRT-based fully homomorphic encryption over the integers
-
J. H. Cheon, J. Kim, M. S. Lee, and A. Yun, “CRT-based fully homomorphic encryption over the integers,” Information Sciences, 2015, pp. 149-162.
-
(2015)
Information Sciences
, pp. 149-162
-
-
Cheon, J.H.1
Kim, J.2
Lee, M.S.3
Yun, A.4
-
21
-
-
84963856290
-
Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
-
Z. Liu, H. Seo, J. Groschl, and H. Kim, “Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes,” IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, pp. 1385-1397.
-
(2016)
IEEE Transactions on Information Forensics and Security
, vol.11
, pp. 1385-1397
-
-
Liu, Z.1
Seo, H.2
Groschl, J.3
Kim, H.4
-
23
-
-
70349309809
-
On lattices, learning with errors, random linear codes, and cryptography
-
O. Regev, “On lattices, learning with errors, random linear codes, and cryptography,” Journal of the ACM, Vol. 56, 2009, p. 34.
-
(2009)
Journal of The ACM
, vol.56
, pp. 34
-
-
Regev, O.1
-
24
-
-
84946024060
-
Efficient ring-LWE Encryption on 8-bit AVR processors
-
Z. Liu, H. Seo, S. S. Roy, J. Groschl, H. Kim, and I. Verbauwhede, “Efficient ring-LWE Encryption on 8-bit AVR processors,” in Proceedings of the 17th Workshop on Cryptographic Hardware and Embedded Systems, Vol. 9293, 2015, pp. 663-682.
-
(2015)
Proceedings of The 17th Workshop on Cryptographic Hardware and Embedded Systems
, vol.9293
, pp. 663-682
-
-
Liu, Z.1
Seo, H.2
Roy, S.S.3
Groschl, J.4
Kim, H.5
Verbauwhede, I.6
-
26
-
-
84856466374
-
(Leveled) fully homomorphic encryption without bootstrapping
-
Z. Brakerski, C. Gentry, and V. Vaikuntanathan, “(Leveled) fully homomorphic encryption without bootstrapping,” in Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, 2012, pp. 309-325.
-
(2012)
Proceedings of The 3rd Innovations in Theoretical Computer Science Conference
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
27
-
-
84865507640
-
Fully homomorphic encryption without modulus switching from classical GapSVP
-
Z. Brakerski, “Fully homomorphic encryption without modulus switching from classical GapSVP,” in Proceedings of the 32nd Cryptology Conference, 2012, pp. 868-886.
-
(2012)
Proceedings of The 32nd Cryptology Conference
, pp. 868-886
-
-
Brakerski, Z.1
-
28
-
-
84866725147
-
Ring switching in BGV-style homomorphic encryption
-
C. Gentry, S. Halevi, C. Peikert, et al., “Ring switching in BGV-style homomorphic encryption,” in Proceedings of the 8th International Security and Cryptography for Networks, 2012, pp. 19-37.
-
(2012)
Proceedings of The 8th International Security and Cryptography for Networks
, pp. 19-37
-
-
Gentry, C.1
Halevi, S.2
Peikert, C.3
-
30
-
-
84861702772
-
Better bootstrapping in fully homomorphic encryption
-
C. Gentry, S. Halevi, and N. Smart, “Better bootstrapping in fully homomorphic encryption,” in Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, 2012, pp. 1-16.
-
(2012)
Proceedings of The 15th International Conference on Practice and Theory in Public Key Cryptography
, pp. 1-16
-
-
Gentry, C.1
Halevi, S.2
Smart, N.3
-
31
-
-
84884485247
-
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
-
C. Gentry, A. Sahai, and B. Waters, “Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based,” in Proceedings of the 33rd Annual Cryptology Conference, 2013, pp. 75-92.
-
(2013)
Proceedings of The 33rd Annual Cryptology Conference
, pp. 75-92
-
-
Gentry, C.1
Sahai, A.2
Waters, B.3
-
33
-
-
84942694191
-
FHEW: Bootstrapping homomorphic encryption in less than a second
-
L. Ducas and D. Micciancio, “FHEW: Bootstrapping homomorphic encryption in less than a second,” in Proceedings of EUROCRYPT, LNCS, 2015, pp. 617-640.
-
(2015)
Proceedings of EUROCRYPT, LNCS
, pp. 617-640
-
-
Ducas, L.1
Micciancio, D.2
-
34
-
-
84925265354
-
Packing messages and optimizing bootstrapping in GSW-FHE
-
R. Hiromasa, M. Abe, and T. Okamoto, “Packing messages and optimizing bootstrapping in GSW-FHE,” in Proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, 2015, pp. 699-715.
-
(2015)
Proceedings of The 18th International Conference on Practice and Theory in Public-Key Cryptography
, pp. 699-715
-
-
Hiromasa, R.1
Abe, M.2
Okamoto, T.3
|