-
1
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
Atallah, M., Bykova, M., Li, J., Frikken, K., Topkara, M.: Private collaborative forecasting and benchmarking. In: ACM Workshop on Privacy in the Electronic Society (WPES), pp. 103-114 (2004)
-
(2004)
ACM Workshop on Privacy in the Electronic Society (WPES)
, pp. 103-114
-
-
Atallah, M.1
Bykova, M.2
Li, J.3
Frikken, K.4
Topkara, M.5
-
2
-
-
70349858081
-
Secure biometric authentication with improved accuracy
-
Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. Springer, Heidelberg
-
Barbosa, M., Brouard, T., Cauchie, S., de Sousa, S.M.: Secure biometric authentication with improved accuracy. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 21-36. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5107
, pp. 21-36
-
-
Barbosa, M.1
Brouard, T.2
Cauchie, S.3
De Sousa, S.M.4
-
3
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
Barni, M., Bianchi, T., Catalano, D., Di Raimondo, M., Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. In: ACM Workshop on Multimedia and Security (MM&Sec), pp. 231-240 (2010)
-
(2010)
ACM Workshop on Multimedia and Security (MM&Sec)
, pp. 231-240
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Di Raimondo, M.4
Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Scotti, F.10
Piva, A.11
-
4
-
-
67749135560
-
A new user dependent iris recognition system based on an area preserving pointwise level set segmentation approach
-
Barzegar, N., Moin, M.: A new user dependent iris recognition system based on an area preserving pointwise level set segmentation approach. EURASIP Journal on Advances in Signal Processing, 1-13 (2009)
-
(2009)
EURASIP Journal on Advances in Signal Processing
, pp. 1-13
-
-
Barzegar, N.1
Moin, M.2
-
6
-
-
76549136227
-
-
Technical Report 2009-03, Department of Computer Science and Engineering, University of Notre Dame
-
Blanton, M., Aliasgari, M.: Secure computation of biometric matching. Technical Report 2009-03, Department of Computer Science and Engineering, University of Notre Dame (2009)
-
(2009)
Secure Computation of Biometric Matching
-
-
Blanton, M.1
Aliasgari, M.2
-
8
-
-
38149070898
-
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
-
Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. Springer, Heidelberg
-
Bringer, J., Chabanne, H., Izabachène, M., Pointcheval, D., Tang, Q., Zimmer, S.: An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 96-106. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4586
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Izabachène, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
-
10
-
-
77955328311
-
Secure computation with fixed-point numbers
-
Sion, R. (ed.) FC 2010. Springer, Heidelberg
-
Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 35-50. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6052
, pp. 35-50
-
-
Catrina, O.1
Saxena, A.2
-
11
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Cramer, R., Damgård, I.B., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-300. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
Damgård, I.B.2
Nielsen, J.B.3
-
12
-
-
69949126271
-
-
Cryptology ePrint Archive, Report 2008/321
-
Damgård, I., Geisler, M., Krøigård, M.: A correction to efficient and secure comparison for on-line auctions. Cryptology ePrint Archive, Report 2008/321 (2008)
-
(2008)
A Correction to Efficient and Secure Comparison for On-line Auctions
-
-
Damgård, I.1
Geisler, M.2
Krøigård, M.3
-
13
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
Damgård, I., Geisler, M., Krøigård, M.: Homomorphic encryption and secure comparison. Journal of Applied Cryptology 1(1), 22-31 (2008)
-
(2008)
Journal of Applied Cryptology
, vol.1
, Issue.1
, pp. 22-31
-
-
Damgård, I.1
Geisler, M.2
Krøigård, M.3
-
14
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous multiparty computation: Theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160-179. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.4
-
16
-
-
69949163699
-
Privacy-preserving face recognition
-
Goldberg, I., Atallah, M.J. (eds.) PETS 2009. Springer, Heidelberg
-
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235-253. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5672
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
17
-
-
38049089776
-
Privacy-preserving set union
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Frikken, K.B.: Privacy-preserving set union. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 237-252. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 237-252
-
-
Frikken, K.B.1
-
18
-
-
78649992236
-
TASTY: Tool for Automating Secure Two-partY computations
-
Henecka, W., Kogl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: TASTY: Tool for Automating Secure Two-partY computations. In: ACM Conference on Computer and Communications Security (CCS), pp. 451-462 (2010)
-
(2010)
ACM Conference on Computer and Communications Security (CCS)
, pp. 451-462
-
-
Henecka, W.1
Kogl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
19
-
-
78649262814
-
A private and reliable recommendation system using a social network
-
Hoens, T., Blanton, M., Chawla, N.: A private and reliable recommendation system using a social network. In: IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pp. 816-825 (2010)
-
(2010)
IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT)
, pp. 816-825
-
-
Hoens, T.1
Blanton, M.2
Chawla, N.3
-
20
-
-
65549084496
-
The best bits in an iris code
-
Hollingsworth, K., Bowyer, K., Flynn, P.: The best bits in an iris code. IEEE Transactions on Pattern Analysis and Machine Intelligence 31(6), 964-973 (2009)
-
(2009)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.31
, Issue.6
, pp. 964-973
-
-
Hollingsworth, K.1
Bowyer, K.2
Flynn, P.3
-
21
-
-
85165845290
-
-
U.S. DHS US-VISIT
-
U.S. DHS US-VISIT, http://www.dhs.gov/files/programs/usv.shtm
-
-
-
-
22
-
-
85165847242
-
-
Multiprecision Integer and Rational Arithmetic C/C++ Library
-
Multiprecision Integer and Rational Arithmetic C/C++ Library, http://www.shamus.ie/
-
-
-
-
24
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
25
-
-
0033730804
-
Filterbank-based fingerprint matching
-
Jain, A., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based fingerprint matching. IEEE Transactions on Image Processing 9(5), 846-859 (2000)
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.5
, pp. 846-859
-
-
Jain, A.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
26
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
27
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
28
-
-
52149120767
-
Implementing two-party computation efficiently with security against malicious adversaries
-
Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
-
Lindell, Y., Pinkas, B., Smart, N.P.: Implementing two-party computation efficiently with security against malicious adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2-20. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5229
, pp. 2-20
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.P.3
-
29
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
30
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: USENIX Security Symposium, pp. 287-302 (2004)
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
31
-
-
1342275940
-
-
2nd edn. Springer, Heidelberg
-
Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Hanbook of Fingerprint Recognition, 2nd edn. Springer, Heidelberg (2009)
-
(2009)
Hanbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.3
Prabhakar, S.4
-
33
-
-
77955178939
-
SCiFI - A system for secure face identification
-
Osadchy, M., Pinkas, B., Jarrous, A., Moskovich, B.: SCiFI - A system for secure face identification. In: IEEE Symposium on Security and Privacy, pp. 239-254 (2010)
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
34
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
35
-
-
72449131818
-
Secure two-party computation is practical
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
36
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: ACM Symposium on Theory of Computing (STOC), pp. 73-85 (1989)
-
(1989)
ACM Symposium on Theory of Computing (STOC)
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
37
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
Lee, D., Hong, S. (eds.) ICISC 2009. Springer, Heidelberg
-
Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 229-244. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5984
, pp. 229-244
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
38
-
-
57049083569
-
Privacy preserving error resilient DNA searching through oblivious automata
-
Troncoso-Pastoriza, J., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient DNA searching through oblivious automata. In: ACM Conference on Computer and Communications Security (CCS), pp. 519-528 (2007)
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
, pp. 519-528
-
-
Troncoso-Pastoriza, J.1
Katzenbeisser, S.2
Celik, M.3
|