-
4
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha N. K., Connell J. H., Bolle R. M., Enhancing security and privacy in biometrics-based authentication systems IBM Systems Journal 2001 40 3 614 634
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
5
-
-
16244386253
-
Feasibility of generating biometric encryption keys
-
Hoque S., Fairhurst M., Howells G., Deravi F., Feasibility of generating biometric encryption keys Electronics Letters 2005 41 6 309 311
-
(2005)
Electronics Letters
, vol.41
, Issue.6
, pp. 309-311
-
-
Hoque, S.1
Fairhurst, M.2
Howells, G.3
Deravi, F.4
-
8
-
-
79960907469
-
K -anonymity
-
New York, NY, USA Springer
-
Ciriani V., di Vimercati S. D. C., Foresti S., Samarati P., k -anonymity Secure Data Management in Decentralized Systems 2007 33 New York, NY, USA Springer 323 353
-
(2007)
Secure Data Management in Decentralized Systems
, vol.33
, pp. 323-353
-
-
Ciriani, V.1
Di Vimercati, S.D.C.2
Foresti, S.3
Samarati, P.4
-
10
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
December, Seoul, South Korea
-
Goethals B., Laur S., Lipmaa H., Mielikinen T., On private scalar product computation for privacy-preserving data mining 3506 Proceedings of the 7th Annual International Conference in Information Security and Cryptology (ICISC 04) December 2005 Seoul, South Korea 104 120
-
(2005)
Proceedings of the 7th Annual International Conference in Information Security and Cryptology (ICISC 04)
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikinen, T.4
-
11
-
-
33750199090
-
Oblivious polynomial evaluation
-
Naor M., Pinkas B., Oblivious polynomial evaluation SIAM Journal on Computing 2006 35 5 1254 1281
-
(2006)
SIAM Journal on Computing
, vol.35
, Issue.5
, pp. 1254-1281
-
-
Naor, M.1
Pinkas, B.2
-
12
-
-
23844556499
-
Oblivious polynomial evaluation and oblivious neural learning
-
Chang Y.-C., Lu C.-J., Oblivious polynomial evaluation and oblivious neural learning Theoretical Computer Science 2005 341 13 39 54
-
(2005)
Theoretical Computer Science
, vol.341
, Issue.13
, pp. 39-54
-
-
Chang, Y.-C.1
Lu, C.-J.2
-
15
-
-
84937542853
-
A cost-effective pay-per-multiplication comparison method for millionaires
-
April San Francisco, Calif, USA Lecture Notes in Computer Science
-
Fischlin M., A cost-effective pay-per-multiplication comparison method for millionaires 2020 Proceedings of the Conference on Topics in Cryptology: The Cryptographers Track at RSA (CT-RSA 2001) April 2001 San Francisco, Calif, USA 457 472 Lecture Notes in Computer Science
-
(2001)
Proceedings of the Conference on Topics in Cryptology: The Cryptographers Track at RSA (CT-RSA 2001)
, vol.2020
, pp. 457-472
-
-
Fischlin, M.1
-
18
-
-
38049077335
-
Secure linear algebra using linearly recurrent sequences
-
February Amsterdam, The Netherlands Lecture Notes in Computer Science
-
Kiltz E., Mohassel P., Weinreb E., Franklin M., Secure linear algebra using linearly recurrent sequences 4392 Proceedings of the 4th Theory of Cryptography Conference (TCC 07) February 2007 Amsterdam, The Netherlands 291 310 Lecture Notes in Computer Science
-
(2007)
Proceedings of the 4th Theory of Cryptography Conference (TCC 07)
, vol.4392
, pp. 291-310
-
-
Kiltz, E.1
Mohassel, P.2
Weinreb, E.3
Franklin, M.4
-
22
-
-
63749090809
-
Distributed privacy preserving k -means clustering with additive secret sharing
-
Nantes, France
-
Doganay M. C., Pedersen T. B., Saygin Y., Sava E., Levi A., Distributed privacy preserving k -means clustering with additive secret sharing 331 Proceedings of the International Workshop on Privacy and Anonymity in Information Society (PAIS 08) 2008 Nantes, France 3 11
-
(2008)
Proceedings of the International Workshop on Privacy and Anonymity in Information Society (PAIS 08)
, vol.331
, pp. 3-11
-
-
Doganay, M.C.1
Pedersen, T.B.2
Saygin, Y.3
Sava, E.4
Levi, A.5
-
25
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y., Pinkas B., Privacy preserving data mining Journal of Cryptology 2002 15 3 177 206
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
31
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
New York, NY, USA Springer Lecture Notes in Computer Science
-
Boneh D., Goh E.-J., Nissim K., Killian J., Evaluating 2-DNF formulas on ciphertexts 3378 Proceedings of the Theory of Cryptography Conference (TCC 05) 2005 New York, NY, USA Springer 325 342 Lecture Notes in Computer Science
-
(2005)
Proceedings of the Theory of Cryptography Conference (TCC 05)
, vol.3378
, pp. 325-342
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
Killian, J.4
-
34
-
-
84974577749
-
One-round secure computation and secure autonomous mobile agents
-
July Geneva, Switzerland
-
Cachin C., Camenisch J., Kilian J., Muller J., One-round secure computation and secure autonomous mobile agents Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP 00) July 2000 Geneva, Switzerland 512 523
-
(2000)
Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP 00)
, pp. 512-523
-
-
Cachin, C.1
Camenisch, J.2
Kilian, J.3
Muller, J.4
-
40
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Erkin Z., Piva A., Katzenbeisser S., Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing EURASIP Journal on Information Security 2007 2007 20
-
(2007)
EURASIP Journal on Information Security
, vol.2007
, pp. 20
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
-
43
-
-
0001710505
-
Analysis of a complex of statistical variables into principal components
-
Hotelling H., Analysis of a complex of statistical variables into principal components Journal of Educational Psychology 1933 24 6 417 441
-
(1933)
Journal of Educational Psychology
, vol.24
, Issue.6
, pp. 417-441
-
-
Hotelling, H.1
-
45
-
-
84976803260
-
Fastmap: A fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets
-
May San Jose, Calif, USA
-
Faloutsos C., Lin K.-I., Fastmap: a fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets Proceedings of the ACM International Conference on Management of Data (SIGMOD 95) May 1995 San Jose, Calif, USA 163 174
-
(1995)
Proceedings of the ACM International Conference on Management of Data (SIGMOD 95)
, pp. 163-174
-
-
Faloutsos, C.1
Lin, K.-I.2
-
46
-
-
51249178997
-
On lipschitz embedding of finite metric spaces in Hilbert space
-
Bourgain J., On lipschitz embedding of finite metric spaces in Hilbert space Israel Journal of Mathematics 1985 52 1-2 46 52
-
(1985)
Israel Journal of Mathematics
, vol.52
, Issue.12
, pp. 46-52
-
-
Bourgain, J.1
-
53
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
May Berkeley, Calif, USA
-
Krohn M. N., Freedman M. J., Mazires D., On-the-fly verification of rateless erasure codes for efficient content distribution 2004 Proceedings of the IEEE Symposium on Security and Privacy (SP 04) May 2004 Berkeley, Calif, USA 226 240
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy (SP 04)
, vol.2004
, pp. 226-240
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazires, D.3
-
54
-
-
70449568287
-
-
Chinese Academy of Sciences Institute of Automation
-
Tan T., Sun Z., Casia-irisv3 2005 Chinese Academy of Sciences Institute of Automation. http://www.cbsr.ia.ac.cn/IrisDatabase.htm
-
(2005)
Casia-irisv3
-
-
Tan, T.1
Sun, Z.2
-
55
-
-
85019313708
-
-
Paillier Library, UC Berkeley
-
Bethencourt J.,. Paillier Library, UC Berkeley, http://acsc.cs.utexas. edu/
-
-
-
Bethencourt, J.1
|