Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks
暂无分享,去创建一个
[1] Çetin Kaya Koç,et al. High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor , 2001 .
[2] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[3] Josep Domingo-Ferrer. A New Privacy Homomorphism and Applications , 1996, Inf. Process. Lett..
[4] J. Ferrer. A new privacy homomorphism and applications , 1996 .
[5] Levent Ertaul,et al. ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I) , 2005, NETWORKING.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Jung Hee Cheon,et al. A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism , 2003, IACR Cryptol. ePrint Arch..
[9] Jim Alves-Foss,et al. The use of encrypted functions for mobile agent security , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[10] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[11] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.