1 |
王雪乔. 论欧盟GDPR中个人数据保护与"同意"细分[J]. 政法论丛, 2019, (4): 136-146.
|
|
WANGX Q. Personal data protection and "consent" segmentationin EU GDPR[J]. Journal of Political Science and Law, 2019, (4): 136-146. (in Chinese)
|
2 |
陈丹伟, 邵菊, 樊晓唯, 等. 基于MAH-ABE的云计算隐私保护访问控制[J]. 电子学报, 2014, 42(4): 821-827.
|
|
CHEND W, SHAOJ, FANX W, et al. MAH-ABE based privacy access control in cloud computing[J]. Acta Electronica Sinica, 2014, 42(4): 821-827. (in Chinese)
|
3 |
SHANZ H, RENK, BLANTONM, et al. Practical secure computation outsourcing[J]. ACM Computing Surveys, 2019, 51(2): 1-40.
|
4 |
蒋林智.(全)同态加密及其在云计算中的应用研究[D].成都: 电子科技大学, 2018.
|
|
JIANGL Z. Research on (Fully) Homomorphic Encryption and Its Application in Cloud Computing[D]. Chengdu: University of Electronic Science and Technology of China, 2018. (in Chinese)
|
5 |
谷思竹. 整数上全同态加密及其在云平台的应用研究[D]. 深圳: 深圳大学, 2016.
|
|
GUS Z. Research on Fully Homomorphic Encryption Over the Integers and Application in Cloud Platform[D]. Shenzhen: Shenzhen University, 2016. (in Chinese)
|
6 |
丁毅, 沈薇, 李洁, 等. 卫星通信全代理同态可信传输机制研究[J]. 中国空间科学技术, 2020, 40(4): 84-96.
|
|
DINGY, SHENW, LIJ, et al. Research on trusted full-proxy homomorphic transmission mechanism for satellite communication[J]. Chinese Space Science and Technology, 2020, 40(4): 84-96. (in Chinese)
|
7 |
GENTRYC. Fully homomorphic encryption using ideal lattices[C]//STOC'09: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. New York: ACM, 2009: 169-178.
|
8 |
VAN DIJKM, GENTRYC, HALEVIS, et al. Fully homomorphic encryption over the integers[C]//29th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2010: 24-43.
|
9 |
CORONJ S, MANDALA, NACCACHED, et al. Fully homomorphic encryption over the integers with shorter public keys[C]//Proceedings of Conference on Advances in Cryptology. New York: Springer-Verlag, 2011: 487-504.
|
10 |
林如磊, 王箭, 杜贺. 整数上的全同态加密方案的改进[J]. 计算机应用研究, 2013, 30(5): 1515-1519.
|
|
LINR L, WANGJ, DUH. Improved fully homomorphic encryption over integers[J]. Application Research of Computers, 2013, 30(5): 1515-1519. (in Chinese)
|
11 |
孙霓刚, 朱浩然, 汪伟昕. 一种适用于n bit的整数上全同态加密方案[J]. 计算机应用研究, 2018, 35(4): 1179-1181.
|
|
SUNN G, ZHUH R, WANGW X. Fully homomorphic encryption scheme applied to n bit[J]. Application Research of Computers, 2018, 35(4): 1179-1181. (in Chinese)
|
12 |
拱长青, 肖芸, 李梦飞, 等. 云计算安全研究综述[J]. 沈阳航空航天大学学报, 2017, 34(4): 1-17.
|
|
GONGC Q, XIAOY, LIM F, et al. Summary of cloud computing security research[J]. Journal of Shenyang Aerospace University, 2017, 34(4): 1-17. (in Chinese)
|
13 |
杨健, 汪海航, 王剑, 等. 云计算安全问题研究综述[J]. 小型微型计算机系统, 2012, 33(3): 472-479.
|
|
YANGJ, WANGH H, WANGJ, et al. Survey on some security issues of cloud computing[J]. Journal of Chinese Computer Systems, 2012, 33(3): 472-479. (in Chinese)
|
14 |
蒋瀚, 徐秋亮. 基于云计算服务的安全多方计算[J]. 计算机研究与发展, 2016, 53(10): 2152-2162.
|
|
JIANGH, XUQ L. Secure multiparty computation in cloud computing[J]. Journal of Computer Research and Development, 2016, 53(10): 2152-2162. (in Chinese)
|
15 |
PEARSONS, SHENY, MOWBRAYM. A privacy manager for cloud computing[C]//IEEE International Conference on Cloud Computing. Berlin, Heidelberg: Springer, 2009: 90-106.
|
16 |
CHAUHANK K, SangerA K S, VermaA. Homomorphic encryption for data security in cloud computing[C]//2015 International Conference on Information Technology(ICIT). Bhubaneswar: IEEE, 2015: 206-209.
|
17 |
MINZ E, YANGG. Homomorphic encryption technology for cloud computing[J]. Procedia Computer Science, 2019, 154:73-83.
|
18 |
GOEYJ Z, LEEW K, GOIB M, et al. Accelerating number theoretic transform in GPU platform for fully homomorphic encryption[J]. The Journal of Supercomputing, 2021, 77(2): 1455-1474.
|
19 |
袁鹏. 图像卷积算法的隐私保护和应用研究[D]. 西安: 西安电子科技大学, 2017.
|
|
YUANP. Privacy Preserving and Application of Image Convolution Algorithm[D]. Xi'an: Xidian University, 2017. (in Chinese)
|
20 |
DOWLINN, GILAD-BACHRACHR, LAINEK, et al. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy[C]//International Conference on Machine Learning. New York: ACM, 2016: 201-210.
|
21 |
CHABANNEH, DE-WARGNYA, MILGRAMJ, et al. Privacy-preserving classification on deep neural network[EB/OL]. (2017)[2020]. .
|
22 |
许世聪. 隐私保护卷积神经网络前向传播方法研究[D]. 西安: 西安电子科技大学, 2019.
|
|
XUS C. Research on Forward Propagation Method of Privacy-Preserving Convolutional Neural Network[D]. Xi'an: Xidian University, 2019. (in Chinese)
|
23 |
李少华. 云端卷积神经网络算法的安全增强机制研究[D]. 合肥: 中国科学技术大学, 2019.
|
|
LIS H. Research on Security Enhancement Mechanism for Convolutional Neural Network Predictions in Cloud[D]. Hefei: University of Science and Technology of China, 2019. (in Chinese)
|
24 |
JUVEKARC, VAIKUNTANATHANV, CHANDRAKASANA. Gazelle: A low latency framework for secure neural network inference[EB/OL]. (2018)[2021]. .
|
25 |
贺海武, 延安, 陈泽华. 基于区块链的智能合约技术与应用综述[J]. 计算机研究与发展, 2018, 55(11): 2452-2466.
|
|
HEH W, YANA, CHENZ H. Survey of smart contract technology and application based on blockchain[J]. Journal of Computer Research and Development, 2018, 55(11): 2452-2466. (in Chinese)
|
26 |
杨强. AI与数据隐私保护:联邦学习的破解之道[J]. 信息安全研究, 2019, 5(11): 961-965.
|
|
YANGQ. AI and data privacy protection: The way to federated learning[J]. Journal of Information Security Research, 2019, 5(11): 961-965. (in Chinese)
|
27 |
CommunityNumPy. NumPy User Guide[EB/OL]. (2020)[2020]. .
|
28 |
LECUNY, BOTTOUL, BENGIOY. MNIST[EB/OL]. [2020]. .
|