-
2
-
-
0002326595
-
Biometric identification
-
Jain, A.K., Hong, L., Pankanti, S.: Biometric identification. Commun. ACM 43, 90-98 (2000)
-
(2000)
Commun. ACM
, vol.43
, pp. 90-98
-
-
Jain, A.K.1
Hong, L.2
Pankanti, S.3
-
3
-
-
79951515545
-
Cloud computing -The business perspective
-
Marstona, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing -The business perspective. Decis. Support Syst. 51, 176-189 (2011)
-
(2011)
Decis. Support Syst.
, vol.51
, pp. 176-189
-
-
Marstona, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
4
-
-
84857356722
-
Security evaluation of biometric keys
-
Al-Assam, H., Jassim, S.: Security evaluation of biometric keys. Comput. Secur. 31, 151-163 (2012)
-
(2012)
Comput. Secur.
, vol.31
, pp. 151-163
-
-
Al-Assam, H.1
Jassim, S.2
-
5
-
-
84923318201
-
Efficient privacy-preserving biometric identification
-
February
-
Huang, Y., Malka, L., Evans, D., Katz, J.: Efficient privacy-preserving biometric identification. In: 18th Annual Network & Distributed System Security Symposium NDSS 2011, February 2011
-
(2011)
18th Annual Network & Distributed System Security Symposium NDSS 2011
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
6
-
-
84862982369
-
Secure outsourced computation of iris matching
-
Blanton, M., Aliasgari, M.: Secure outsourced computation of iris matching. J. Comput. Secur. 20, 259-305 (2012)
-
(2012)
J. Comput. Secur.
, vol.20
, pp. 259-305
-
-
Blanton, M.1
Aliasgari, M.2
-
7
-
-
84921338933
-
Outsourceable twoparty privacy-preserving biometric authentication
-
ACM
-
Chun, H., Elmehdwi, Y., Li, F., Bhattacharya, P., Jiang, W.: Outsourceable twoparty privacy-preserving biometric authentication. In: 9th Symposium on Information, Computer and Communications Security ASIACCS 2014, pp. 401-412. ACM (2014)
-
(2014)
9th Symposium on Information, Computer and Communications Security ASIACCS 2014
, pp. 401-412
-
-
Chun, H.1
Elmehdwi, Y.2
Li, F.3
Bhattacharya, P.4
Jiang, W.5
-
9
-
-
84990035985
-
CloudBI: Practical privacypreserving outsourcing of biometric identification in the cloud
-
Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.), Springer, Heidelberg
-
Wang, N., Hu, S., Ren, K., He, M., Du, M., Wang, Z.: CloudBI: practical privacypreserving outsourcing of biometric identification in the cloud. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS. Springer, Heidelberg (2015)
-
(2015)
ESORICS 2015. LNCS
-
-
Wang, N.1
Hu, S.2
Ren, K.3
He, M.4
Du, M.5
Wang, Z.6
-
11
-
-
79958167312
-
Privacy preserving clustering by data transformation
-
Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving clustering by data transformation. J. Inf. Data Manag. 1, 53-56 (2010)
-
(2010)
J. Inf. Data Manag.
, vol.1
, pp. 53-56
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
-
12
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
ACM
-
Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: 28th ACM International Conference on Management of Data, SIGMOD 2009, pp. 139-152. ACM (2009)
-
(2009)
28th ACM International Conference on Management of Data, SIGMOD 2009
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
13
-
-
33750293582
-
An attacker’s view of distance preserving maps for privacy preserving data mining
-
Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.), Springer, Heidelberg
-
Liu, K., Giannella, C.M., Kargupta, H.: An attacker’s view of distance preserving maps for privacy preserving data mining. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 297-308. Springer, Heidelberg (2006)
-
(2006)
PKDD 2006. LNCS (LNAI)
, vol.4213
, pp. 297-308
-
-
Liu, K.1
Giannella, C.M.2
Kargupta, H.3
|