-
2
-
-
43049174575
-
Speeded-up robust features (surf)
-
H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, "Speeded-up robust features (surf)," CVIU, vol. 110, No. 3, pp. 346-359, 2008
-
(2008)
CVIU
, vol.110
, Issue.3
, pp. 346-359
-
-
Bay, H.1
Ess, A.2
Tuytelaars, T.3
Van Gool, L.4
-
3
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
IEEE
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in S&P. IEEE, 2007, pp. 321-334
-
(2007)
S&P
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
84914165766
-
Privacy tag: Privacy concern expressed and respected
-
ACM
-
C. Bo, G. Shen, J. Liu, X.-Y. Li, Y. Zhang, and F. Zhao, "Privacy. tag: Privacy concern expressed and respected," in SenSys. ACM, 2014
-
(2014)
SenSys
-
-
Bo, C.1
Shen, G.2
Liu, J.3
Li, X.-Y.4
Zhang, Y.5
Zhao, F.6
-
5
-
-
79952521625
-
Brief: Binary robust independent elementary features
-
M. Calonder, V. Lepetit, C. Strecha, and P. Fua, "Brief: Binary robust independent elementary features," in ECCV, 2010
-
(2010)
ECCV
-
-
Calonder, M.1
Lepetit, V.2
Strecha, C.3
Fua, P.4
-
6
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Springer
-
J. Camenisch, G. Neven et al., "Simulatable adaptive oblivious transfer," in EUROCRYPT. Springer, 2007, pp. 573-590
-
(2007)
EUROCRYPT
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
-
7
-
-
74049163235
-
Improving privacy and security in multiauthority attribute-based encryption
-
ACM
-
M. Chase and S. S. Chow, "Improving privacy and security in multiauthority attribute-based encryption," in CCS. ACM, 2009
-
(2009)
CCS
-
-
Chase, M.1
Chow, S.S.2
-
8
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
ACM
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in CCS. ACM, 2006
-
(2006)
CCS
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
9
-
-
69949163699
-
Privacy-preserving face recognition
-
Springer
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Privacy Enhancing Technologies. Springer, 2009, pp. 235-253
-
(2009)
Privacy Enhancing Technologies
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
10
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices." in STOC, vol. 9, 2009, pp. 169-178
-
(2009)
STOC
, vol.9
, pp. 169-178
-
-
Gentry, C.1
-
12
-
-
70449560133
-
Hamming embedding and weak geometric consistency for large scale image search
-
H. Jegou, M. Douze, and C. Schmid, "Hamming embedding and weak geometric consistency for large scale image search," in ECCV, 2008
-
(2008)
ECCV
-
-
Jegou, H.1
Douze, M.2
Schmid, C.3
-
13
-
-
84883112893
-
Privacy preserving cloud data access with multi-authorities
-
IEEE
-
T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Privacy preserving cloud data access with multi-authorities," in INFOCOM. IEEE, 2013
-
(2013)
INFOCOM
-
-
Jung, T.1
Li, X.-Y.2
Wan, Z.3
Wan, M.4
-
14
-
-
33744792263
-
Pedestrian detection in crowded scenes
-
IEEE
-
B. Leibe, E. Seemann, and B. Schiele, "Pedestrian detection in crowded scenes," in CVPR. IEEE, 2005
-
(2005)
CVPR
-
-
Leibe, B.1
Seemann, E.2
Schiele, B.3
-
15
-
-
84866351451
-
Toward privacy-assured cloud data services with flexible search functionalities
-
IEEE
-
M. Li, S. Yu, W. Lou, and Y. T. Hou, "Toward privacy-assured cloud data services with flexible search functionalities," in ICDCSW. IEEE, 2012
-
(2012)
ICDCSW
-
-
Li, M.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
16
-
-
0032209062
-
Feature detection with automatic scale selection
-
T. Lindeberg, "Feature detection with automatic scale selection," IJCV, vol. 30, No. 2, pp. 79-116, 1998
-
(1998)
IJCV
, vol.30
, Issue.2
, pp. 79-116
-
-
Lindeberg, T.1
-
17
-
-
24744472288
-
A proof of yao's protocol for secure two-party computation
-
Y. Lindell and B. Pinkas, "A proof of yao's protocol for secure two-party computation." IACR Cryptology ePrint Archive, p. 175, 2004
-
(2004)
IACR Cryptology EPrint Archive
, pp. 175
-
-
Lindell, Y.1
Pinkas, B.2
-
18
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
D. G. Lowe, "Distinctive image features from scale-invariant keypoints," IJCV, vol. 60, No. 2, pp. 91-110, 2004
-
(2004)
IJCV
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.G.1
-
19
-
-
34547505090
-
Personspecific sift features for face recognition
-
IEEE
-
J. Luo, Y. Ma, E. Takikawa, S. Lao, M. Kawade, and B.-L. Lu, "Personspecific sift features for face recognition," in ICASSP. IEEE, 2007
-
(2007)
ICASSP
-
-
Luo, J.1
Ma, Y.2
Takikawa, E.3
Lao, S.4
Kawade, M.5
Lu, B.-L.6
-
20
-
-
0019728174
-
Box-filtering techniques
-
M. McDonnell, "Box-filtering techniques," Computer Graphics and Image Processing, vol. 17, No. 1, pp. 65-70, 1981
-
(1981)
Computer Graphics and Image Processing
, vol.17
, Issue.1
, pp. 65-70
-
-
McDonnell, M.1
-
21
-
-
9644260534
-
Scale & affine invariant interest point detectors
-
K. Mikolajczyk and C. Schmid, "Scale & affine invariant interest point detectors," IJCV, vol. 60, No. 1, pp. 63-86, 2004
-
(2004)
IJCV
, vol.60
, Issue.1
, pp. 63-86
-
-
Mikolajczyk, K.1
Schmid, C.2
-
22
-
-
70349675925
-
Fast approximate nearest neighbors with automatic algorithm configuration
-
M. Muja and D. G. Lowe, "Fast approximate nearest neighbors with automatic algorithm configuration." in VISAPP (1), 2009, pp. 331-340
-
(2009)
VISAPP
, Issue.1
, pp. 331-340
-
-
Muja, M.1
Lowe, D.G.2
-
23
-
-
36048948044
-
A privacy-preserving technique for euclidean distance-based mining algorithms using fourierrelated transforms
-
S. Mukherjee, Z. Chen, and A. Gangopadhyay, "A privacy-preserving technique for euclidean distance-based mining algorithms using fourierrelated transforms," VLDB Journal, vol. 15, No. 4, pp. 293-315, 2006
-
(2006)
VLDB Journal
, vol.15
, Issue.4
, pp. 293-315
-
-
Mukherjee, S.1
Chen, Z.2
Gangopadhyay, A.3
-
24
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT. Springer, 1999, pp. 223-238
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
25
-
-
80052275017
-
Binary sift: Fast image retrieval using binary quantized sift features
-
K. Peker, "Binary sift: Fast image retrieval using binary quantized sift features," in CBMI, 2011
-
(2011)
CBMI
-
-
Peker, K.1
-
26
-
-
85076695685
-
P3: Toward privacy-preserving photo sharing
-
USENIX
-
M.-R. Ra, R. Govindan, and A. Ortega, "P3: Toward privacy-preserving photo sharing," in NSDI. USENIX, 2013
-
(2013)
NSDI
-
-
Ra, M.-R.1
Govindan, R.2
Ortega, A.3
-
27
-
-
84949922298
-
Privacy-preserving ranked multikeyword search leveraging polynomial function in cloud computing
-
IEEE
-
Y. Ren, Y. Chen, J. Yang, and B. Xie, "Privacy-preserving ranked multikeyword search leveraging polynomial function in cloud computing," in Globecom. IEEE, 2014
-
(2014)
Globecom
-
-
Ren, Y.1
Chen, Y.2
Yang, J.3
Xie, B.4
-
28
-
-
77954610725
-
Efficient privacypreserving face recognition
-
Springer Berlin Heidelberg
-
A.-R. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacypreserving face recognition," in Information, Security and Cryptology. Springer Berlin Heidelberg, 2010, pp. 229-244
-
(2010)
Information, Security and Cryptology
, pp. 229-244
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
29
-
-
84881184166
-
Scalable crowd-sourcing of video from mobile devices
-
ACM
-
P. Simoens, Y. Xiao, P. Pillai, Z. Chen, K. Ha, and M. Satyanarayanan, "Scalable crowd-sourcing of video from mobile devices," in MobiSys. ACM, 2013
-
(2013)
MobiSys
-
-
Simoens, P.1
Xiao, Y.2
Pillai, P.3
Chen, Z.4
Ha, K.5
Satyanarayanan, M.6
-
30
-
-
0026065565
-
Eigenfaces for recognition
-
M. Turk and A. Pentland, "Eigenfaces for recognition," Journal of cognitive neuroscience, vol. 3, No. 1, pp. 71-86, 1991
-
(1991)
Journal of Cognitive Neuroscience
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.1
Pentland, A.2
-
31
-
-
2142812371
-
Robust real-time face detection
-
P. Viola and M. J. Jones, "Robust real-time face detection," International journal of computer vision, vol. 57, No. 2, pp. 137-154, 2004
-
(2004)
International Journal of Computer Vision
, vol.57
, Issue.2
, pp. 137-154
-
-
Viola, P.1
Jones, M.J.2
-
32
-
-
84866761388
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
IEEE
-
B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," in CLOUD. IEEE, 2012
-
(2012)
CLOUD
-
-
Wang, B.1
Li, B.2
Li, H.3
-
33
-
-
84883129081
-
Verifiable private multi-party computation: Ranging and ranking
-
IEEE
-
L. Zhang, X.-Y. Li, Y. Liu, and T. Jung, "Verifiable private multi-party computation: ranging and ranking," in INFOCOM. IEEE, 2013
-
(2013)
INFOCOM
-
-
Zhang, L.1
Li, X.-Y.2
Liu, Y.3
Jung, T.4
|