References
- Hyung-Jin Mun, Kun-Hee Han. (2016). A Study on Design for Efficient Personal Policy of Service based RBAC. Journal of Digital Convergence, 14(2), 191-196. doi:10.14400/JDC.2016.14.2.191
- Hyung-Jin Mun, Jung-Seok Suh. (2008). Sensitive Personal Information Protection Model for RBAC System. Journal of the Korea Society of Computer and Information, 13(5) , 103-110.
- Hyung-jin Mun, Keon-myung Lee, Yong-zhen Li, Dong-heui Lee, Sang-ho Lee. (2006). Design of a Policy based Privacy Protection System using Encryption Techniques. Journal of the Korea Institute of Information Security & Cryptology, 16(2), 33-43.
- DongaScience. (2018.11.19.). Identifying homophobic code technology for safe data utilization. http://dongascience.donga.com/news.php?idx=25155.
- Jong-Hyuk Im, Mun-Kyu Lee. (2015). Implementation and performance comparison of batch homomorphic encryption applications over the integers. The Journal Of Korean Institute Of Next Generation Computing, 11(6), 19-28.
- Minseok Oh. (2018). Strengthening Big Data Privacy through homomorphic encryption, Proceedings of the Korea Information Processing Society Conference, 139-141.
- Myoung In Jeong. (2013). Technical Trend of Fully Homomorphic Encryption. The Journal of the Korea Contents Association, 13(8), 36-43. doi:10.5392/JKCA.2013.13.08.036
- Sehwan Kim, Hyunsoo Yoon. (2014). A Survey of applying Fully Homomorphic Encryption in the Cloud system. Journal of the Korean Institute of Information Security and Cryptology, 24(5), 941-949 doi:10.13089/JKIISC.2014.24.5.941
- Jae-Heon Kim, Sang-Kyung Yoo, Sang-Han Lee. (2013). Fully Homomorphic Encryption Scheme without Key Switching. The Journal of Korean Institute of Communications and Information Sciences, 38(5), 428-433. doi:10.7840/kics.2013.38C.5.428
- Rivest-Adleman-Dertouzos, On data banks and privacy homomorphism, FOSC'78.
- Hyunsung Kim, Sung-Woon Lee. (2013). Homomorphic Encryption Scheme and Applications for Cloud Computing Security, Journal of Security Engineering, 10(2), 213-224.
- Jun Seok Lee. (2009). A Study on the Multicast Security System in Multiple Core Environment. Journal of Industrial Convergence , 7(1), 21-31.
- D. Boneh, E.-J. Goh, K. Nissim. (2005, Feb). Evaluating 2-DNF formulas on ciphertexts, In Proc. Theory of Cryptography Conf. (TCC) '05, 325-341, Cambridge, U.S.A.
- Gentry, C., & Boneh, D. (2009). A fully homomorphic encryption scheme, 20(09). Stanford: Stanford University.
- C. Gentry. (2009, May). Fully homomorphic encryption using ideal lattices. In Proc. 41st ACM Symp. Theory of Computing (STOC). 169-178, Bethesda, U.S.A.
- Hyun-Jong Cha, Ho-Kyung Yang, Kang-Im Choi, Hwang-Bin Ryou, Hyo-Young Shin. (2015). Design of the secure data management system using homomorphic encryption. Jouranl of Information and Security, 15(4), 97-103.
- Armknecht, F., Boyd, C., Carr, C., Gjosteen, K., Jaschke, A., Reuter, C. A., & Strand, M. (2015). A Guide to Fully Homomorphic Encryption. IACR Cryptology ePrint Archive, 1192.