Cited By
View all- SHINOKI HNUIDA K(2024)On Extension of Evaluation Algorithms in Keyed-Homomorphic EncryptionIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023CIP0007E107.A:3(218-233)Online publication date: 1-Mar-2024
- Ren HLi HLiu DXu GShen X(2022)Enabling Secure and Versatile Packet Inspection With Probable Cause Privacy for Outsourced MiddleboxIEEE Transactions on Cloud Computing10.1109/TCC.2021.305902610:4(2580-2594)Online publication date: 1-Oct-2022
- Shinoki HNuida K(2022)On Extension of Evaluation Algorithms in Keyed-Homomorphic EncryptionAdvances in Information and Computer Security10.1007/978-3-031-15255-9_10(189-207)Online publication date: 12-Aug-2022
- Show More Cited By