-
1
-
-
84864063536
-
Efficient methods for privacy preserving face detection. In: Advances in neural information processing systems (NIPS’06)
-
Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing systems (NIPS’06), pp 57–64
-
(2006)
pp 57–64
-
-
Avidan, S.1
Butman, M.2
-
2
-
-
77952879647
-
Human face recognition using fuzzy multilayer perceptron
-
Bhattacharjee D, Basu DK, Nasipuri M, Kundu M (2010) Human face recognition using fuzzy multilayer perceptron. Soft Comput 14(6):559–570
-
(2010)
Soft Comput
, vol.14
, Issue.6
, pp. 559-570
-
-
Bhattacharjee, D.1
Basu, D.K.2
Nasipuri, M.3
Kundu, M.4
-
3
-
-
84862982369
-
Secure outsourced computation of Iris matching
-
Blanton M, Aliasgari M (2012) Secure outsourced computation of Iris matching. J Comput Security 20(2):259–305
-
(2012)
J Comput Security
, vol.20
, Issue.2
, pp. 259-305
-
-
Blanton, M.1
Aliasgari, M.2
-
4
-
-
14844335721
-
Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM conference on Computer and communications security
-
Boyen X (2004) Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM conference on Computer and communications security, pp 82–91
-
(2004)
pp 82–91
-
-
Boyen, X.1
-
5
-
-
84911438843
-
Cloud-based adaptive compression and secure management services for 3D healthcare data
-
Castiglione A, Pizzolante R, De-Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3D healthcare data. Futur Gener Comput Syst 1(43):120–134
-
(2015)
Futur Gener Comput Syst
, vol.1
, Issue.43
, pp. 120-134
-
-
Castiglione, A.1
Pizzolante, R.2
De-Santis, A.3
Carpentieri, B.4
Castiglione, A.5
Palmieri, F.6
-
7
-
-
84906242615
-
New algorithms for secure outsourcing of modular exponentiations
-
Chen XF, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 9(25):2386–2396
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.9
, Issue.25
, pp. 2386-2396
-
-
Chen, X.F.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
8
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier’s probabilistic public-key system
-
Damgard IB, Jurik MJ (2001) A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Public-Key Cryptography (PKC’01), vol LNCS 1992, pp 119–136
-
(2001)
Public-Key Cryptography (PKC’01), vol LNCS
, vol.1992
, pp. 119-136
-
-
Damgard, I.B.1
Jurik, M.J.2
-
9
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
Damgard I, Geisler M, Kroigard M (2008) Homomorphic encryption and secure comparison. J Appl Cryptol 1(1):22–31
-
(2008)
J Appl Cryptol
, vol.1
, Issue.1
, pp. 22-31
-
-
Damgard, I.1
Geisler, M.2
Kroigard, M.3
-
10
-
-
38149074802
-
Efficient and secure comparison for online auctions
-
Damgard I, Geisler M, Kroigard M (2007) Efficient and secure comparison for online auctions. In: Australasian Conference on Information Security and Privacy (ACISP’07), vol LNCS 4586, pp 416–430
-
(2007)
Australasian Conference on Information Security and Privacy (ACISP’07), vol LNCS
, vol.4586
, pp. 416-430
-
-
Damgard, I.1
Geisler, M.2
Kroigard, M.3
-
11
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Dijk MV, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. In: Advances in Cryptology—ASIACRYPT 2010, vol LNCS 6110, pp 24–43
-
(2010)
Advances in Cryptology—ASIACRYPT 2010, vol LNCS
, vol.6110
, pp. 24-43
-
-
Dijk, M.V.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
12
-
-
52149117439
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
Dodis Y, Ostrovsky R, Reyzin L, Smith A (2008) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J Comput 38(1):97–139
-
(2008)
SIAM J Comput
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
13
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in cryptology-Eurocrypt, vol LNCS 3027, pp 523–540
-
(2004)
Advances in cryptology-Eurocrypt, vol LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
14
-
-
33845535268
-
Scrambling for video surveillance with privacy. In: Computer vision and pattern recognition workshop, New York
-
Dufaux F, Ebrahimi T (2006) Scrambling for video surveillance with privacy. In: Computer vision and pattern recognition workshop, New York, pp 160–160
-
(2006)
pp 160–160
-
-
Dufaux, F.1
Ebrahimi, T.2
-
15
-
-
69949163699
-
Privacy-preserving face recognition
-
Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy-preserving face recognition. In: Privacy Enhancing Technologies (PET’09), vol LNCS 5672, pp 235–253
-
(2009)
Privacy Enhancing Technologies (PET’09), vol LNCS
, vol.5672
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
16
-
-
84888842651
-
Interconnecting federated clouds by using publish-subscribe service
-
Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903
-
(2013)
Clust Comput
, vol.16
, Issue.4
, pp. 887-903
-
-
Esposito, C.1
Ficco, M.2
Palmieri, F.3
Castiglione, A.4
-
17
-
-
84978670345
-
Smart cloud storage service selection based on fuzzy logic. IEEE Trans Comput, Theory Evid Game Theory (99)
-
Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic. IEEE Trans Comput, Theory Evid Game Theory (99). doi:10.1109/TC.2015.2389952
-
(2015)
doi:10.1109/TC.2015.2389952
-
-
Esposito, C.1
Ficco, M.2
Palmieri, F.3
Castiglione, A.4
-
18
-
-
30844458593
-
A fuzzy vault scheme
-
Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237–257
-
(2006)
Des Codes Cryptogr
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
19
-
-
79952365404
-
Protection of Biometric Information. In: Security with Noisy Data
-
Kevenaar T (2007) Protection of Biometric Information. In: Security with Noisy Data, pp 169–193
-
(2007)
pp 169–193
-
-
Kevenaar, T.1
-
21
-
-
84894634556
-
Securely outsourcing attribute-based encryption with checkability
-
Li J, Huang X, Li JW, Chen XF, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.8
, pp. 2201-2210
-
-
Li, J.1
Huang, X.2
Li, J.W.3
Chen, X.F.4
Xiang, Y.5
-
22
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
Li J, Chen XF, Li MQ, Li JW, Lee P, Lou WJ (2014a) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.F.2
Li, M.Q.3
Li, J.W.4
Lee, P.5
Lou, W.J.6
-
23
-
-
84884802064
-
Fine-grained access control based on outsourced attribute-based encryption
-
Li J, Chen XF, Li JW, Jia CF, Ma JF, Lou WJ (2013) Fine-grained access control based on outsourced attribute-based encryption. In: Proceeding of The European Symposium on Research in Computer Security (ESORICS), vol LNCS 3184, pp 592–609
-
(2013)
Proceeding of The European Symposium on Research in Computer Security (ESORICS), vol LNCS
, vol.3184
, pp. 592-609
-
-
Li, J.1
Chen, X.F.2
Li, J.W.3
Jia, C.F.4
Ma, J.F.5
Lou, W.J.6
-
24
-
-
84981694814
-
A proof of Yao’s protocol for secure two-party computation. In: Cryptology ePrint Archive
-
Lindell Y, Pinkas B (2004) A proof of Yao’s protocol for secure two-party computation. In: Cryptology ePrint Archive, Report 2004/175
-
(2004)
Report 2004/175
-
-
Lindell, Y.1
Pinkas, B.2
-
25
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates. In: International Conference on Audio and Video Based Biometric Person Authentication
-
Linnartz J, Tuyls P (2003) New shielding functions to enhance privacy and prevent misuse of biometric templates. In: International Conference on Audio and Video Based Biometric Person Authentication, pp 393–402
-
(2003)
pp 393–402
-
-
Linnartz, J.1
Tuyls, P.2
-
26
-
-
84944515126
-
Dual-kernel based 2D linear discriminant analysis for face recognition
-
Liu XZ, Ye HW (2014) Dual-kernel based 2D linear discriminant analysis for face recognition. J Ambient Intell Hum Comput (4). doi:10.1007/s12652-014-0230-2
-
(2014)
J Ambient Intell Hum Comput (4)
-
-
Liu, X.Z.1
Ye, H.W.2
-
27
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: proceeding of the 29th IEEE International Conference on Computer Communications(INFOCOM 2010), pp 441–445
-
(2010)
proceeding of the 29th IEEE International Conference on Computer Communications(INFOCOM
, vol.2010
, pp. 441-445
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
30
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-EUROCRYPT’99, vol LNCS 1592, pp 223–238
-
(1999)
In Advances in Cryptology-EUROCRYPT’99, vol LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
31
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
-
(2001)
IBM Syst J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
32
-
-
33947529940
-
Cancelable biometrics: A case study in fingerprints
-
Ratha N, Connell J, Bolle R, Chikkerur S (2006) Cancelable biometrics: A case study in fingerprints. In: Proceedings of the 18th International Conference on Pattern Recognition (ICPR), vol IV, pp 370–373
-
(2006)
Proceedings of the 18th International Conference on Pattern Recognition (ICPR)
, vol.4
, pp. 370-373
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
Chikkerur, S.4
-
33
-
-
77954610725
-
Efficient Privacy-Preserving Face Recognition
-
Sadeghi AR, Schneider T, Wehrenberg I (2010) Efficient Privacy-Preserving Face Recognition. In: Information, Security and Cryptology-ICISC 2009, vol LNCS 5984, pp 229–244
-
(2010)
Information, Security and Cryptology-ICISC 2009, vol LNCS
, vol.5984
, pp. 229-244
-
-
Sadeghi, A.R.1
Schneider, T.2
Wehrenberg, I.3
-
35
-
-
0026384289
-
Face recognition using eigenfaces. In: Proceedings of the IEEE Computer vision and pattern recognition (CVPR’91)
-
Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: Proceedings of the IEEE Computer vision and pattern recognition (CVPR’91), pp 586–591
-
(1991)
pp 586–591
-
-
Turk, M.A.1
Pentland, A.P.2
-
36
-
-
26444507172
-
Practical biometric authentication with template protection
-
Tuyls P, Akkermans AH, Kevenaar TA, Schrijen GJ, Bazen AM, Veldhuis RN (2005) Practical biometric authentication with template protection. In: Audio- and video-based biometric person authentication (AVBPA), vol LNCS 3546, 436–446
-
(2005)
Audio- and video-based biometric person authentication (AVBPA), vol LNCS
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.2
Kevenaar, T.A.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.6
-
37
-
-
84981693163
-
Securely outsourcing exponentiations with single untrusted program for cloud storage
-
Wang YJ, Wu QH, Wong DS, Qin B, Chow SSM, Liu Z, Tan X (2014) Securely outsourcing exponentiations with single untrusted program for cloud storage. Comput Secur-ESORICS 2014:326–343
-
(2014)
Comput Secur-ESORICS
, vol.2014
, pp. 326-343
-
-
Wang, Y.J.1
Wu, Q.H.2
Wong, D.S.3
Qin, B.4
Chow, S.S.M.5
Liu, Z.6
Tan, X.7
-
38
-
-
0022882770
-
How to generate and exchange secrets. In: Foundations of Computer Science, 1986, 27th Annual Symposium
-
Yao AC (1986) How to generate and exchange secrets. In: Foundations of Computer Science, 1986, 27th Annual Symposium, pp 162–167
-
(1986)
pp 162–167
-
-
Yao, A.C.1
-
39
-
-
69949171179
-
Privacy protecting visual processing for secure video surveillance. In: Proceedings of the International Conference on Image Processing (ICIP’08)
-
Yu X, Chinomi K, Koshimizu T, Nitta N, Ito Y, Babaguchi N (2008) Privacy protecting visual processing for secure video surveillance. In: Proceedings of the International Conference on Image Processing (ICIP’08), pp 1672–1675
-
(2008)
pp 1672–1675
-
-
Yu, X.1
Chinomi, K.2
Koshimizu, T.3
Nitta, N.4
Ito, Y.5
Babaguchi, N.6
|