{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:27:35Z","timestamp":1725683255697},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859786","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T16:19:16Z","timestamp":1406737156000},"page":"1400-1404","source":"Crossref","is-referenced-by-count":22,"title":["Homomorphic encryption in the cloud"],"prefix":"10.1109","author":[{"given":"Darko","family":"Hrestak","sequence":"first","affiliation":[]},{"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"850","article-title":"Homomorphic evaluation of the aes circuit","author":"gentry","year":"2012","journal-title":"Crypto"},{"journal-title":"Above the Clouds A Berkeley View of Cloud Computing","year":"2009","author":"armbrust","key":"15"},{"journal-title":"HElib An Implementation of Homomorphic Encryption","year":"2014","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"journal-title":"The NIST Definition of Cloud Computing (Final)","year":"2011","author":"mell","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.98"},{"key":"12","first-page":"24","article-title":"Fully homomorphic encryption over the integers","author":"van dijk","year":"2010","journal-title":"Eurocrypt"},{"key":"3","first-page":"169","article-title":"On data banks and privacy homomorphisms","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","author":"katz","year":"2007","journal-title":"Introduction to Modern Cryptography"},{"key":"10","first-page":"325","article-title":"Evaluating 2-dnf formulas on ciphertexts","author":"boneh","year":"2005","journal-title":"Proceedings of the Second International Conference on Theory of Cryptography Ser TCC'05"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"6","first-page":"119","article-title":"A generalisation, a simplification and some applications of pailliers probabilistic public-key system","author":"damgard","year":"2001","journal-title":"Proceedings of PKC '01 LNCS Series"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"4"},{"key":"9","first-page":"10","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","author":"el gamal","year":"1985","journal-title":"Proceedings of CRYPTO 84 on Advances in cryptology"},{"journal-title":"Thep-the Homomorphic Encryption Project-Computation on Encrypted Data for the Masses","year":"2014","key":"8"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2014,5,26]]},"location":"Opatija, Croatia","end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859786.pdf?arnumber=6859786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T10:49:25Z","timestamp":1565693365000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859786\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859786","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}