暂无分享,去创建一个
[1] James P. Durbano,et al. Securing the Cloud , 2010, Cloud Computing.
[2] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[3] J. R. Vic Winkler. Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2011 .
[4] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[5] Brian Anderson,et al. Secure Multi-Tenancy for Private, Public, and Hybrid Clouds , 2011 .
[6] Nivedita Manohar,et al. A Survey of Virtualization Techniques in Cloud Computing , 2013 .
[7] Osman Ugus. Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS , 2007 .
[8] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[9] Ed Dawson,et al. A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption , 2005, ISC.
[10] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[11] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[12] Sean Carlin,et al. Cloud Computing Technologies , 2012, CloudCom 2012.
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.