-
1
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Article ID 78943, 20 pages
-
Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, "Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing," EURASIP Journal on Information Security, vol. 2007, Article ID 78943, 20 pages, 2007.
-
(2007)
EURASIP Journal on Information Security
, vol.2007
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.L.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
2
-
-
69949163699
-
Privacy-preserving face recognition
-
Berlin, Heidelberg: Springer-Verlag
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 235-253.
-
(2009)
PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
3
-
-
77954610725
-
Efficient privacypreserving face recognition
-
Springer-Verlag, December 2-4
-
A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacypreserving face recognition," in ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, ser. LNCS, vol. 5984. Springer-Verlag, December 2-4, 2009, pp. 235-253.
-
(2009)
ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, Ser. LNCS
, vol.5984
, pp. 235-253
-
-
Sadeghi, A.1
Schneider, T.2
Wehrenberg, I.3
-
4
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer-Verlag
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, 1999, pp. 223-238.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
5
-
-
60449095773
-
On the implementation of the discrete Fourier transform in the encrypted domain
-
March
-
T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Transaction on Information Forensics and Security, vol. 4, no. 1, pp. 86-97, March 2009.
-
(2009)
IEEE Transaction on Information Forensics and Security
, vol.4
, Issue.1
, pp. 86-97
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
6
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
March 2010
-
--, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Transaction on Information Forensics and Security, vol. 5, no. 1, pp. 180-187, March 2010.
-
IEEE Transaction on Information Forensics and Security
, vol.5
, Issue.1
, pp. 180-187
-
-
-
7
-
-
38149074802
-
Efficient and secure comparison for on-line auctions
-
ser. Lecture Notes in Computer Science, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., Springer
-
I. Damgård, M. Geisler, and M. Krøigard, "Efficient and secure comparison for on-line auctions," in ACISP, ser. Lecture Notes in Computer Science, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., vol. 4586. Springer, 2007, pp. 416-430.
-
(2007)
ACISP
, vol.4586
, pp. 416-430
-
-
Damgard, I.1
Geisler, M.2
Krigard, M.3
-
8
-
-
72449131818
-
Secure twoparty computation is practical
-
ser. Lecture Notes in Computer Science, M. Matsui, Ed., Springer
-
B. Pinkas, T. Schneider, N. Smart, and S. Williams, "Secure twoparty computation is practical," in ASIACRYPT, ser. Lecture Notes in Computer Science, M. Matsui, Ed., vol. 5912. Springer, 2009, pp. 250-267.
-
(2009)
ASIACRYPT
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.3
Williams, S.4
-
9
-
-
0033730804
-
Filterbank-based fingerprint matching
-
May
-
A. Jain, S. Prabhakar, L. Hong, and S. Pankanti, "Filterbank-based fingerprint matching," IEEE Transactions on Image Processing, vol. 9, no. 5, pp. 846-859, May 2000.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.5
, pp. 846-859
-
-
Jain, A.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
10
-
-
78650313296
-
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates
-
September
-
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, and F. Scotti, "A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates," in IEEE Fourth International Conference On Biometrics: Theory, Applications And Systems (BTAS 2010), September 2010.
-
(2010)
IEEE Fourth International Conference on Biometrics: Theory, Applications and Systems (BTAS 2010)
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Di Raimondo, M.4
Donida Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Piva, A.10
Scotti, F.11
-
11
-
-
78650090123
-
Sample fingerprint databases
-
available at
-
"Sample fingerprint databases," VeriFinger download page, 2006, available at http://www.neurotechnology.com/download.html.
-
(2006)
VeriFinger Download Page
-
-
|