Cited By
View all- Wang QWang YZhou FXu JZhang C(2025)Privacy-preserving fair outsourcing polynomial computation without FHE and FPRComputer Standards & Interfaces10.1016/j.csi.2024.10389991:COnline publication date: 1-Jan-2025
- Pelosi G(2025)Secure Audit LogsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_688(2218-2220)Online publication date: 8-Jan-2025
- Lenard TCollen ANijdam N(2024)Using the Trusted Platform Module to Generate Secure Logs for Automotive Systems2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)10.1109/ICCP63557.2024.10792999(1-6)Online publication date: 17-Oct-2024
- Show More Cited By