搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: A. C.-F. Chan
DOI: 10.1109/ICC.2009.5199505
关键词:
摘要: … ciphertext is usually the one who does its encryption. In this paper, we work on how to process encrypted data without any loss of data confidentiality. An example is a small company, …
international conference on computer science and information technology,2011, 引用: 5
,2011, 引用: 14
,2010, 引用: 57
international parallel and distributed processing symposium,2012, 引用: 38
International Journal of Distributed Sensor Networks,2014, 引用: 37
international conference on control instrumentation communication and computational technologies,2014, 引用: 0
Studia Scientiarum Mathematicarum Hungarica,2015, 引用: 29
SpringerPlus,2013, 引用: 0
Sai Om Journal of Science, Engineering & Technology: A Peer Reviewed International Journal (Online ISSN 2347-7555),2014, 引用: 1
,2011, 引用: 0