An Extended Framework of Privacy-Preserving Computation With Flexible Access Control
暂无分享,去创建一个
Laurence T. Yang | Zheng Yan | Mianxiong Dong | Robert H. Deng | Rui Hu | Wenxiu Ding | Xinren Qian | M. Dong | L. Yang | R. Deng | Zheng Yan | Wenxiu Ding | Xinren Qian | Rui Hu
[1] Eike Kiltz,et al. Secure Computation of the Mean and Related Statistics , 2005, IACR Cryptol. ePrint Arch..
[2] Stefan Katzenbeisser,et al. Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.
[3] Rui Hu,et al. A survey on data provenance in IoT , 2019, World Wide Web.
[4] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[5] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[6] Robert H. Deng,et al. Server-Aided Revocable Attribute-Based Encryption , 2016, ESORICS.
[7] Laurence T. Yang,et al. A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion , 2019, Inf. Fusion.
[8] D. Richard Kuhn,et al. An Access Control scheme for Big Data processing , 2014, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[9] Robert H. Deng,et al. Privacy-Preserving Data Processing with Flexible Access Control , 2020, IEEE Transactions on Dependable and Secure Computing.
[10] Octavian Catrina,et al. Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.
[11] Robert H. Deng,et al. Encrypted data processing with Homomorphic Re-Encryption , 2017, Inf. Sci..
[12] Wei Jiang,et al. An efficient and probabilistic secure bit-decomposition , 2013, ASIA CCS '13.
[13] Rui Zhang,et al. Verifiable outsourced computation over encrypted data , 2019, Inf. Sci..
[14] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.
[15] Stefan Katzenbeisser,et al. Secure computations on non-integer values , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[16] Qing Zhu,et al. Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment , 2020, IEEE Transactions on Dependable and Secure Computing.
[17] Zekeriya Erkin,et al. Privacy enhanced recommender system , 2010 .
[18] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[19] Mauro Conti,et al. A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..
[20] Thijs Veugen,et al. Encrypted integer division and secure comparison , 2014, Int. J. Appl. Cryptogr..
[21] Zekeriya Erkin,et al. Secure Fixed-point Division for Homomorphically Encrypted Operands , 2018, ARES.
[22] Prasanna Palsodkar,et al. Design and implementation of goldschmidts algorithm for floating point division and square root , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[23] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[24] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[25] Ming Li,et al. A tale of two clouds: Computing on data encrypted under multiple keys , 2014, 2014 IEEE Conference on Communications and Network Security.
[26] Tomas Toft,et al. On Secure Two-Party Integer Division , 2012, Financial Cryptography.
[27] Dan Liu,et al. A Survey on Secure Data Analytics in Edge Computing , 2019, IEEE Internet of Things Journal.
[28] Rafail Ostrovsky,et al. Secure two-party k-means clustering , 2007, CCS '07.
[29] Masahiro Yagisawa,et al. Fully Homomorphic Encryption without bootstrapping , 2015, IACR Cryptol. ePrint Arch..
[30] Robert H. Deng,et al. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.