-
2
-
-
77956778645
-
Secure outsourcing of scientific computations
-
M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. E. Spafford. Secure outsourcing of scientific computations. Advances in Computers, Vol. 54, pp. 215-272, 2002.
-
(2002)
Advances in Computers
, vol.54
, pp. 215-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.E.4
-
4
-
-
79957487964
-
Privacy-preserving ecg classification with branching programs and neural networks
-
M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider. Privacy-preserving ecg classification with branching programs and neural networks. IEEE TIFS, Vol. 6, No. 2, pp. 452-468, 2011.
-
(2011)
IEEE TIFS
, vol.6
, Issue.2
, pp. 452-468
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Sadeghi, A.4
Schneider, T.5
-
5
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
T. Bianchi, A. Piva, and M. Barni. Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE TIFS, Vol. 5, No. 1, pp. 180-187, 2010.
-
(2010)
IEEE TIFS
, vol.5
, Issue.1
, pp. 180-187
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
7
-
-
85032751316
-
Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends
-
J. Bringer, H. Chabanne, and A. Patey. Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. Signal Processing Magazine, 2013.
-
(2013)
Signal Processing Magazine
-
-
Bringer, J.1
Chabanne, H.2
Patey, A.3
-
10
-
-
77949825199
-
Privacy-preserving face recognition
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In Proc. of PET, 2009.
-
(2009)
Proc. of PET
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
12
-
-
84867864555
-
Image feature extraction in encrypted domain with privacy-preserving sift
-
C.-Y. Hsu, C.-S. Lu, and S.-C. Pei. Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans. Image Processing, Vol. 21, No. 11, pp. 4593-4607, 2012.
-
(2012)
IEEE Trans. Image Processing
, vol.21
, Issue.11
, pp. 4593-4607
-
-
Hsu, C.-Y.1
Lu, C.-S.2
Pei, S.-C.3
-
14
-
-
79954510617
-
Homomorphic encryption-based secure sift for privacy-preserving feature extraction
-
C.-Y. Hsu, C.-S. Lu, and S.-C. Pei. Homomorphic encryption-based secure sift for privacy-preserving feature extraction. In Proc of IEEE SPIE, 2011.
-
(2011)
Proc of IEEE SPIE
-
-
Hsu, C.-Y.1
Lu, C.-S.2
Pei, S.-C.3
-
15
-
-
5044233274
-
Pca-sift: A more distinctive representation for local image descriptors
-
Y. Ke and R. Sukthankar. Pca-sift: A more distinctive representation for local image descriptors. In Proc. of IEEE CVPR, 2004.
-
(2004)
Proc. of IEEE CVPR
-
-
Ke, Y.1
Sukthankar, R.2
-
16
-
-
84913542485
-
Why johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising
-
P. Leon, B. Ur, R. Shay, Y. Wang, R. Balebako, and L. Cranor. Why johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising. In Proc. of ACM SIGCHI, 2012.
-
(2012)
Proc. of ACM SIGCHI
-
-
Leon, P.1
Ur, B.2
Shay, R.3
Wang, Y.4
Balebako, R.5
Cranor, L.6
-
17
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
D. G. Lowe. Distinctive image features from scale-invariant keypoints. International journal of computer vision, Vol. 60, No. 2, pp. 31-110, 2004.
-
(2004)
International Journal of Computer Vision
, vol.60
, Issue.2
, pp. 31-110
-
-
Lowe, D.G.1
-
20
-
-
84913542483
-
Too close for comfort: A study of the effectiveness and acceptability of rich-media personalized advertising
-
M. Malheiros, C. Jennett, S. Patel, S. Brostoff, and M. A. Sasse. Too close for comfort: A study of the effectiveness and acceptability of rich-media personalized advertising. In Proc. of ACM SIGCHI, 2012.
-
(2012)
Proc. of ACM SIGCHI
-
-
Malheiros, M.1
Jennett, C.2
Patel, S.3
Brostoff, S.4
Sasse, M.A.5
-
21
-
-
77956533993
-
Illumination invariant representation for privacy preserving face identification
-
B. Moskovich and M. Osadchy. Illumination invariant representation for privacy preserving face identification. In Proc. of IEEE CVPRW, 2010.
-
(2010)
Proc. of IEEE CVPRW
-
-
Moskovich, B.1
Osadchy, M.2
-
24
-
-
84913548523
-
Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation
-
S. J. Patel, A. Chouhan, and D. C. Jinwala. Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation. Journal of Information Security, Vol. 5, No. 1, pp. 12-18, 2014.
-
(2014)
Journal of Information Security
, vol.5
, Issue.1
, pp. 12-18
-
-
Patel, S.J.1
Chouhan, A.2
Jinwala, D.C.3
-
28
-
-
77955920069
-
A new chaos-based fast image encryption algorithm
-
Y. Wang, K.-W. Wong, X. Liao, and G. Chen. A new chaos-based fast image encryption algorithm. Applied soft computing, Vol. 11, No. 1, pp. 514-522 2011.
-
(2011)
Applied Soft Computing
, vol.11
, Issue.1
, pp. 514-522
-
-
Wang, Y.1
Wong, K.-W.2
Liao, X.3
Chen, G.4
-
30
-
-
0001772530
-
Protocols for secure computations
-
A. C.-C. Yao. Protocols for secure computations. In Proc. of IEEE FOCS, 1982.
-
(1982)
Proc. of IEEE FOCS
-
-
Yao, A.C.-C.1
-
31
-
-
84988239854
-
Privacy-preserving outsourcing of image global feature detection
-
Z. Qin, J. Yan, C. Wang, K. Ren, C. W. Chen, and X. Fu. Privacy-preserving Outsourcing of Image Global Feature Detection. In Proc. of IEEE Globecom, 2014.
-
(2014)
Proc. of IEEE Globecom
-
-
Qin, Z.1
Yan, J.2
Wang, C.3
Ren, K.4
Chen, C.W.5
Fu, X.6
-
32
-
-
84907741049
-
Enabling privacy-preserving image-centric social discovery
-
X. Yuan, X. Wang, C. Wang, A. Squicciarini, and K. Ren. Enabling Privacy-preserving Image-centric Social Discovery. In Proc. of IEEE ICDCS, 2014.
-
(2014)
Proc. of IEEE ICDCS
-
-
Yuan, X.1
Wang, X.2
Wang, C.3
Squicciarini, A.4
Ren, K.5
|