메뉴 건너뛰기




Volumn 15, Issue 4, 2007, Pages 1404-1413

A framework for secure speech recognition

Author keywords

Gaussian mixture models; Hidden Markov model (HMM); Secure multiparty computation (SMC); Speech recognition

Indexed keywords

GAUSSIAN MIXTURE MODELS; HIDDEN MARKOV MODEL (HMM); PRIVACY-PRESERVING; PRIVATE INFORMATIONS; SECURE MULTIPARTY COMPUTATION (SMC); SPEECH DATUM; SPEECH RECOGNITION SYSTEMS;

EID: 50249135964     PISSN: 15587916     EISSN: None     Source Type: Journal    
DOI: 10.1109/TASL.2007.894526     Document Type: Article
Times cited : (61)

References (21)
  • 3
    • 24144477856 scopus 로고    scopus 로고
    • Secure computation of the mean and related statistics
    • Proc. Theory Cryptography Conf
    • E. Kiltz, G. Leander, and J. Malone-Lee, "Secure computation of the mean and related statistics," in Proc. Theory Cryptography Conf., 2005, vol. 3378, Lecture Notes in Computer Science, pp. 283-302.
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 283-302
    • Kiltz, E.1    Leander, G.2    Malone-Lee, J.3
  • 4
    • 37648998755 scopus 로고    scopus 로고
    • Blind Vision
    • S. Avidan and M. Butman, "Blind Vision," in Proc. ECCV, 2006, vol. 3, pp. 1-13.
    • (2006) Proc. ECCV , vol.3 , pp. 1-13
    • Avidan, S.1    Butman, M.2
  • 5
    • 20444449548 scopus 로고    scopus 로고
    • Secure multi-party computation
    • Online, Available
    • O. Goldreich, "Secure multi-party computation," Working Draft, 2000 [Online]. Available: http://citeseer.ist.psu.edu/ goldreich98secure.html
    • (2000) Working Draft
    • Goldreich, O.1
  • 6
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb
    • L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 7
    • 64149129636 scopus 로고    scopus 로고
    • S. Laur and H. Lipmaa, Additive conditional disclosure of secrets and applications, Cryptology ePrint Archive, 2005, Rep. 2005/378.
    • S. Laur and H. Lipmaa, "Additive conditional disclosure of secrets and applications," Cryptology ePrint Archive, 2005, Rep. 2005/378.
  • 8
    • 84946847417 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation and oblivious neural learning
    • Proc. Adv. Cryptol-Asiacrypt'01
    • Y.-C. Chang and C.-J. Lu, "Oblivious polynomial evaluation and oblivious neural learning," in Proc. Adv. Cryptol-Asiacrypt'01, 2001, vol. 2248, Lecture Notes in Computer Science, pp. 369-384.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 369-384
    • Chang, Y.-C.1    Lu, C.-J.2
  • 9
    • 24944523186 scopus 로고    scopus 로고
    • On private scalar product computation for privacy-preserving data mining
    • B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, C. Park and S. Chee, Eds, Proc. Int. Conf. Inf. Security Cryptol
    • B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, C. Park and S. Chee, Eds., "On private scalar product computation for privacy-preserving data mining," in Proc. Int. Conf. Inf. Security Cryptol., 2004, vol. 2506, Lecture Notes in Computer Science, pp. 104-120.
    • (2004) Lecture Notes in Computer Science , vol.2506 , pp. 104-120
  • 10
    • 84927517111 scopus 로고    scopus 로고
    • Privacy-preserving cooperative statistical analysis
    • New Orleans, LA, Dec
    • W. Du and M. J. Atallah, "Privacy-preserving cooperative statistical analysis," in Proc. 17th Annu. Comput. Security Applicat. Conf., New Orleans, LA, Dec. 2001, pp. 102-110.
    • (2001) Proc. 17th Annu. Comput. Security Applicat. Conf , pp. 102-110
    • Du, W.1    Atallah, M.J.2
  • 11
    • 0242612156 scopus 로고    scopus 로고
    • A practical approach to solve secure multi-party computation problems
    • Virginia Beach, VA, Sep. 23-26
    • W. Du and Z. Zhan, "A practical approach to solve secure multi-party computation problems," in Proc. New Security Paradigms Workshop, Virginia Beach, VA, Sep. 23-26, 2002, pp. 127-135.
    • (2002) Proc. New Security Paradigms Workshop , pp. 127-135
    • Du, W.1    Zhan, Z.2
  • 12
    • 84948451182 scopus 로고    scopus 로고
    • A secure protocol for computing dot-products in clustered and distributed environments
    • Vancouver, BC, Canada
    • I. Ioannidis, A. Grama, and M. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments," in Proc. Int. Conf. Parallel Process., Vancouver, BC, Canada, 2002, pp. 379-384.
    • (2002) Proc. Int. Conf. Parallel Process , pp. 379-384
    • Ioannidis, I.1    Grama, A.2    Atallah, M.3
  • 14
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • Edmonton, AB, Canada, ACM SIGKDD
    • J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," in Proc. Int. Conf. Knowledge Discovery and Data Mining, Edmonton, AB, Canada, 2002, ACM SIGKDD.
    • (2002) Proc. Int. Conf. Knowledge Discovery and Data Mining
    • Vaidya, J.1    Clifton, C.2
  • 16
    • 35048846561 scopus 로고    scopus 로고
    • Strong conditional oblivious transfer and computing on intervals
    • Proc. Adv. Cryptol, Asiacrypt'04, P. J. Lee, Ed. New York: Springer-Verlag
    • I. F. Blake and V. Kolesnikov, "Strong conditional oblivious transfer and computing on intervals," in Proc. Adv. Cryptol.- Asiacrypt'04, P. J. Lee, Ed. New York: Springer-Verlag, 2004, vol. 3329, LNCS, pp. 515-529.
    • (2004) LNCS , vol.3329 , pp. 515-529
    • Blake, I.F.1    Kolesnikov, V.2
  • 17
    • 26444581774 scopus 로고    scopus 로고
    • An efficient solution to the millionaires' problem based on homomorphic encryption
    • Proc Int. Conf. Appl. Cryptography Network Security
    • H.-Y. Lin and W.-G. Tzeng, "An efficient solution to the millionaires' problem based on homomorphic encryption," in Proc Int. Conf. Appl. Cryptography Network Security, 2005, vol. 3531, LNCS, pp. 456-466.
    • (2005) LNCS , vol.3531 , pp. 456-466
    • Lin, H.-Y.1    Tzeng, W.-G.2
  • 18
    • 33646358700 scopus 로고    scopus 로고
    • Experimental analysis of a privacy-preserving scalar product protocol
    • Z. Yang, R. Wright, and H. Subramaniam, "Experimental analysis of a privacy-preserving scalar product protocol," Int. J. Comput. Syst. Sci. Eng., vol. 21, no. 1, pp. 47-52, 2006.
    • (2006) Int. J. Comput. Syst. Sci. Eng , vol.21 , Issue.1 , pp. 47-52
    • Yang, Z.1    Wright, R.2    Subramaniam, H.3
  • 19
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, simplification and some applications of Paillier's probabilistic public-key system
    • Proc. Int. Workshop Practice Theory Public Key Cryptography
    • I. Damgard and M. Jurik, "A generalisation, simplification and some applications of Paillier's probabilistic public-key system," in Proc. Int. Workshop Practice Theory Public Key Cryptography, 2001, vol. 1992, Lecture Notes in Computer Science, pp. 119-136.
    • (2001) Lecture Notes in Computer Science , vol.1992 , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 20
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, J. Stern, Ed, Proc. Adv. Cryptol.-Eurocrypt'99
    • P. Paillier, J. Stern, Ed., "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Adv. Cryptol.-Eurocrypt'99, 1999, vol. 1592, Lecture Notes in Computer Science, pp. 223-238.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.