-
1
-
-
77951955873
-
Protocols for secure remote database access with approximate matching
-
W. Du, M. Atallah, and F. Kerschbaum, "Protocols for secure remote database access with approximate matching," in Seventh ACM Conference on Computer and Communications Security, 2000, pp. 523-540.
-
(2000)
Seventh ACM Conference on Computer and Communications Security
, pp. 523-540
-
-
Du, W.1
Atallah, M.2
Kerschbaum, F.3
-
2
-
-
0037943836
-
1-difference algorithm for massive data streams
-
1-difference algorithm for massive data streams," SIAM J. COMPUT., vol. 32, no. 1, pp. 131-151, 2002.
-
(2002)
SIAM J. COMPUT.
, vol.32
, Issue.1
, pp. 131-151
-
-
Feigenbaum, J.1
Kannan, S.2
Strauss, M.J.3
Viswanathan, M.4
-
3
-
-
0022882770
-
How to generate and exchange secrets
-
Washington, DC, USA, IEEE Computer Society
-
A. C-C. Yao, "How to Generate and Exchange Secrets," in Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS), Washington, DC, USA, 1986, pp. 162-167, IEEE Computer Society.
-
(1986)
Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS)
, pp. 162-167
-
-
Yao, A.C.-C.1
-
4
-
-
0034504507
-
Stable distributions, pseudorandom generators, embeddings and data stream computation
-
Redondo Beach, CA, Nov.
-
P. Indyk, " Stable Distributions, Pseudorandom Generators, Embeddings and Data Stream Computation," in IEEE Symposium on Foundations of Computer Science, Redondo Beach, CA, Nov. 2000, pp. 189-197.
-
(2000)
IEEE Symposium on Foundations of Computer Science
, pp. 189-197
-
-
Indyk, P.1
-
5
-
-
70349216521
-
Secure image retrieval through feature detection
-
Taipei, Taiwan
-
W. Lu, A. Varna, and M. Wu, "Secure Image Retrieval through Feature Detection," in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Taipei, Taiwan, 2009.
-
(2009)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing
-
-
Lu, W.1
Varna, A.2
Wu, M.3
-
6
-
-
0001654702
-
Extensions of lipschitz mapping into hilbert space
-
W. B. Johnson and J. Lindenstrauss, "Extensions of Lipschitz Mapping Into Hilbert Space," Contemporary Mathematics, vol. 26, pp. 189-206, 1984.
-
(1984)
Contemporary Mathematics
, vol.26
, pp. 189-206
-
-
Johnson, W.B.1
Lindenstrauss, J.2
-
7
-
-
0038166193
-
Database-friendly random projections: Johnson-lindenstrauss with binary coins
-
D. Achlioptas, "Database-friendly Random Projections: Johnson-lindenstrauss With Binary Coins," Journal of Computer and System Sciences, vol. 66, pp. 671-687, 2003.
-
(2003)
Journal of Computer and System Sciences
, vol.66
, pp. 671-687
-
-
Achlioptas, D.1
-
8
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer-Verlag, Lecture Notes in Computer Science
-
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in Advances in Cryptology, EUROCRYPT 99. 1999, vol. 1592, pp. 233-238, Springer-Verlag, Lecture Notes in Computer Science.
-
(1999)
Advances in Cryptology, EUROCRYPT 99.
, vol.1592
, pp. 233-238
-
-
Paillier, P.1
-
9
-
-
77951953963
-
Secure distortion computation in the encrypted domain using homomorphic encryption
-
Cairo, Egypt, Oct.
-
S. Rane, W. Sun, and A. Vetro, "Secure Distortion Computation in the Encrypted Domain Using Homomorphic Encryption," in Proc. IEEE International Conference on Image Processing, Cairo, Egypt, Oct. 2009.
-
(2009)
Proc. IEEE International Conference on Image Processing
-
-
Rane, S.1
Sun, W.2
Vetro, A.3
-
10
-
-
84893763193
-
-
National Institute of Standards and Technology (NIST)
-
National Institute of Standards and Technology (NIST), "Multiple biometric grand challenge database," http://face.nist.gov/mbgc/.
-
Multiple Biometric Grand Challenge Database
-
-
|