Problem Domain Analysis of IoT-Driven Secure Data Markets
暂无分享,去创建一个
[1] Máté Horváth,et al. The Birth of Cryptographic Obfuscation -- A Survey , 2018, IACR Cryptol. ePrint Arch..
[2] David Cash,et al. Targeted Homomorphic Attribute-Based Encryption , 2016, TCC.
[3] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[4] Erol Gelenbe. Analysis of single and networked auctions , 2009, TOIT.
[5] Alex Pentland,et al. Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.
[6] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[7] Frederik Armknecht,et al. A Guide to Fully Homomorphic Encryption , 2015, IACR Cryptol. ePrint Arch..
[8] Thomas Steinke,et al. Differential Privacy: A Primer for a Non-Technical Audience , 2018 .
[9] Abdelmadjid Bouabdallah,et al. Trusted Execution Environment: What It is, and What It is Not , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[10] Erol Gelenbe,et al. Performance of Auctions and Sealed Bids , 2009, EPEW.