共 50 条
- [21] Private Boolean Query Processing on Encrypted Data [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 321 - 332
- [22] Towards Encrypted Query Processing for the Internet of Things [J]. MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2015, : 251 - 253
- [23] Processing Analytical Queries over Encrypted Data [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (05): : 289 - 300
- [24] CryptDB: Protecting Confidentiality with Encrypted Query Processing [J]. SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2011, : 85 - 100
- [25] ENKI: Access Control for Encrypted Query Processing [J]. SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, : 183 - 196
- [26] Secure Access Delegation of Encrypted Medical Information [J]. 2016 10TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION AND COMMUNICATION TECHNOLOGY (ISMICT), 2016,
- [28] Securing encrypted image information in audio data [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (21) : 33063 - 33085
- [29] Authentication of Encrypted Secret Information in Image Steganography [J]. 2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
- [30] Adaptive encrypted information hiding scheme for images [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 950 - +