M. Blake, J. McWaters, and R. Galaski. “The next generation of data-sharing in financial services: Using privacy enhancing techniques to unlock new value”. In: World Economic Forum. 2019, pp. 1–36. |
A. Acar, H. Aksu, A. S. Uluagac, and M. Conti. “A Survey on Homomorphic Encryption Schemes: Theory and Implementation”. In: 51.4 (2018). issn: 0360-0300. doi: 10.1145/3214303. |
N. Dowlin, R. Gilad-Bachrach, K. Laine, K. Lauter, M. Naehrig, and J. Wernsing. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. Tech. rep. MSR-TR-2016-3. 2016. |
E. Maass. Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy. 2020. (visited on 05/23/2023). |
A. S. Gillis. Homomorphic Encryption. 2022. (visited on 05/23/2023). |
R. Yackel. What is homomorphic encryption, and why isn’t it mainstream? 2021. (visited on 05/23/2023). |
A. Wood, K. Najarian, and D. Kahrobaei. “Homomorphic encryption for machine learning in medicine and bioinformatics”. In: ACM Computing Surveys (CSUR) 53.4 (2020), pp. 1–35. doi: 10.1145/3394658. |
Chainlink. Homomorphic Encryption. 2023. (visited on 05/23/2023). |
J. Contreras. Homomorphic encryption with SEAL. (visited on 05/23/2023). |
A. Jackson. 20 Use Cases of Homomorphic Encryption Every CISO Must Know. 2023. (visited on 05/23/2023). |
J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos. “Security and Privacy for Cloud-Based IoT: Challenges”. In: IEEE Communications Magazine 55.1 (2017), pp. 26–33. doi: 10.1109/MCOM.2017.1600363CM. |
A. Lopardo, T. Farrand, A. J. Hall, and A. Benaissa. What is homomorphic encryption? 2020. (visited on 05/23/2023). |
Gartner. "Gartner Says Digital Ethics is at the Peak of Inflated Expectations in the 2021 Gartner Hype Cycle for Privacy." 2021. (visited on 07/11/2023). |
C. Cadwalladr and E. Graham-Harrison. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. 2018. (visited on05/23/2023). |