-
1
-
-
77955518611
-
Efficient multi-secret image sharing based on Boolean operations
-
T.H. Chen, and C.S. Wu Efficient multi-secret image sharing based on Boolean operations Signal Processing 91 1 2011 90 97
-
(2011)
Signal Processing
, vol.91
, Issue.1
, pp. 90-97
-
-
Chen, T.H.1
Wu, C.S.2
-
2
-
-
64549086284
-
MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty
-
C.N. Yang, A.G. Peng, and T.S. Chen MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty Signal Processing 89 8 2009 1602-1624
-
(2009)
Signal Processing
, vol.89
, Issue.8
, pp. 1602-1624
-
-
Yang, C.N.1
Peng, A.G.2
Chen, T.S.3
-
3
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
Article ID 13801, doi
-
C. Fontaine, F. Galand, A survey of homomorphic encryption for nonspecialists, EURASIP Journal on Information Security 2007 (2007), Article ID 13801, doi: 10.1155/2007/13801.
-
(2007)
EURASIP Journal on Information Security 2007
-
-
Fontaine, C.1
Galand, F.2
-
4
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Article ID 78943, doi
-
Z. Erkin, A. Piva, S. Katzenbeisser R.L. Lagendijk, J. Shokrollahi, G. Neven, M. Barni, Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP Journal on Information Security 2007 (2007), Article ID 78943, doi: 10.1155/2007/78943.
-
(2007)
EURASIP Journal on Information Security 2007
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, R.L.3
Lagendijk, S.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
6
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signatures and public key cryptosystems Communications of the ACM 21 2 1978 120 126 (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
8
-
-
85037118321
-
Efficient multiplicative homomorphic e-voting
-
K. Peng, and F. Bao Efficient multiplicative homomorphic e-voting Information Security LNCS 6531 2010 381 393
-
(2010)
Information Security LNCS
, vol.6531
, pp. 381-393
-
-
Peng, K.1
Bao, F.2
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. E1Gamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory 31 4 1985 469 472
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
10
-
-
79957452485
-
Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
-
O. Ugus, D. Westhoff, R. Laue, A. Shoufan, S.A. Huss, Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks, CoRR abs/0903.3900, 2009.
-
(2009)
CoRR abs/0903.3900
-
-
Ugus, O.1
Westhoff, D.2
Laue, R.3
Shoufan, A.4
Huss, S.A.5
-
11
-
-
77957940949
-
Efficient and robust secure aggregation of encrypted data in sensor networks
-
Venice, Italy, IEEE, 1825 July
-
J.M. Bahi, C. Guyeux, A. Makhoul, Efficient and robust secure aggregation of encrypted data in sensor networks, in: Proceedings of the Fourth International Conference on Sensor Technologies and Applications, Venice, Italy, IEEE, 1825 July 2010, pp. 472277.
-
(2010)
Proceedings of the Fourth International Conference on Sensor Technologies and Applications
, pp. 472277
-
-
Bahi, J.M.1
Guyeux, C.2
Makhoul, A.3
-
12
-
-
83955163424
-
Secure data aggregation in wireless sensor networks: Homomorphism versus watermarking approach
-
J.M. Bahi, C. Guyeux, and A. Makhoul Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach Ad Hoc Networks, LNICST 49 2010 344 358
-
(2010)
Ad Hoc Networks, LNICST
, vol.49
, pp. 344-358
-
-
Bahi, J.M.1
Guyeux, C.2
Makhoul, A.3
-
13
-
-
0348003132
-
-
Kluwer Academic Publishers
-
N. Koblitz, A. Menezes, and S. Vanstone The state of elliptic curve cryptography, Designs, Codes and Cryptography 19 2000 Kluwer Academic Publishers pp. 173193
-
(2000)
The State of Elliptic Curve Cryptography, Designs, Codes and Cryptography
, vol.19
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
14
-
-
77951953963
-
Secure distortion computation among untrusting parties using homomorphic encryption
-
Cairo, Eygpt, IEEE, 710 November
-
S.D. Rane, W. Sun, A. Vetro, Secure distortion computation among untrusting parties using homomorphic encryption, in: Proceedings of the 16th IEEE International Conference on Image Processing, Cairo, Eygpt, IEEE, 710 November 2009, pp. 14851488.
-
(2009)
Proceedings of the 16th IEEE International Conference on Image Processing
, pp. 1485-1488
-
-
Rane, S.D.1
Sun, W.2
Vetro, A.3
-
15
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: Advances in Cryptology - Eurocrypt '99, LNCS, vol. 1592, 1999, pp. 223238.
-
(1999)
Advances in Cryptology - Eurocrypt '99, LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
16
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
DOI 10.1109/TIP.2005.859383
-
M. Kuribayashi, and H. Tanaka Fingerprinting protocol for images based on additive homomorphic property IEEE Transactions on Image Processing 14 12 2005 2129 2139 (Pubitemid 41763728)
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
17
-
-
78649897589
-
Secure network coding over the integers
-
R. Gennaro, J. Katz, H. Krawczyk, T. Rabin, Secure network coding over the integers, in: Public Key Cryptography, LNCS, vol. 6056, 2010, pp. 142160.
-
(2010)
Public Key Cryptography, LNCS
, vol.6056
, pp. 142-160
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
18
-
-
77953179820
-
Efficient privacy preserving video surveillance
-
Kyoto, Japan, 29 September2 October
-
M. Upmanyu, A.M. Namboodiri, K. Srinathan, C.V. Jawahar, Efficient privacy preserving video surveillance, in: Proceedings of the 12th IEEE International Conference on Computer Vision, Kyoto, Japan, 29 September2 October 2009, pp. 16391646.
-
(2009)
Proceedings of the 12th IEEE International Conference on Computer Vision
, pp. 1639-1646
-
-
Upmanyu, M.1
Namboodiri, A.M.2
Srinathan, K.3
Jawahar, C.V.4
-
21
-
-
84855359030
-
-
〈http://libtomcrypt.org/tfm/features.html[EB/OL]〉.
-
-
-
-
23
-
-
57749200497
-
Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator
-
X. Tong, and M. Cui Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator Signal Processing 89 4 2009 480 491
-
(2009)
Signal Processing
, vol.89
, Issue.4
, pp. 480-491
-
-
Tong, X.1
Cui, M.2
|