-
1
-
-
84921338933
-
Outsourceable two-party privacy-preserving biometric authentication
-
H. Chun, Y. Elmehdwi, F. Li, P. Bhattacharya, and W. Jiang, “Outsourceable two-party privacy-preserving biometric authentication,” in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014, pp. 401-412.
-
(2014)
Proceedings of The 9th ACM Symposium on Information, Computer and Communications Security
, pp. 401-412
-
-
Chun, H.1
Elmehdwi, Y.2
Li, F.3
Bhattacharya, P.4
Jiang, W.5
-
2
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
I. Damgard, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft, “Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation,” in Proceedings of Theory of Cryptography Conference, 2006, pp. 285-304.
-
(2006)
Proceedings of Theory of Cryptography Conference
, pp. 285-304
-
-
Damgard, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.B.4
Toft, T.5
-
3
-
-
38149074802
-
Efficient and secure comparison for online auctions
-
I. Damgard, M. Geisler, and M. Krøigaard, “Efficient and secure comparison for online auctions,” in Proceedings of Australasian Conference on Information Security and Privacy, 2007, pp. 416-430.
-
(2007)
Proceedings of Australasian Conference on Information Security and Privacy
, pp. 416-430
-
-
Damgard, I.1
Geisler, M.2
Krøigaard, M.3
-
4
-
-
84901750940
-
Secure k-nearest neighbor query over encrypted data in outsourced environments
-
Y. Elmehdwi, B. K. Samanthula, and W. Jiang, “Secure k-nearest neighbor query over encrypted data in outsourced environments,” in Proceedings of IEEE 30th International Conference on Data Engineering, 2014, pp. 664-675.
-
(2014)
Proceedings of IEEE 30th International Conference on Data Engineering
, pp. 664-675
-
-
Elmehdwi, Y.1
Samanthula, B.K.2
Jiang, W.3
-
5
-
-
69949163699
-
Privacy preserving face recognition
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, “Privacy preserving face recognition,” in Proceedings of International Symposium on Privacy Enhancing Technologies Symposium, 2009, pp. 235-253.
-
(2009)
Proceedings of International Symposium on Privacy Enhancing Technologies Symposium
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
6
-
-
84861133582
-
Generating private recommendations efficiently using homomorphic encryption and data packing
-
Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, “Generating private recommendations efficiently using homomorphic encryption and data packing,” IEEE Transactions on Information Forensics and Security, Vol. 7, 2012, pp. 1053-1066.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, pp. 1053-1066
-
-
Erkin, Z.1
Veugen, T.2
Toft, T.3
Lagendijk, R.L.4
-
7
-
-
38049064946
-
Practical and secure solutions for integer comparison
-
I. Garay, B. Schoenmakers, and J. Villegas, “Practical and secure solutions for integer comparison,” in Proceedings of International Workshop on Public Key Cryptography, 2007, pp. 330-342.
-
(2007)
Proceedings of International Workshop on Public Key Cryptography
, pp. 330-342
-
-
Garay, I.1
Schoenmakers, B.2
Villegas, J.3
-
9
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Y. Huang, D. Evans, J. Katz, and L. Malka, “Faster secure two-party computation using garbled circuits,” in Proceedings of USENIX Security Symposium, Vol. 201, 2011, pp. 1-16.
-
(2011)
Proceedings of USENIX Security Symposium
, vol.201
, pp. 1-16
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
10
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, “Improved garbled circuit building blocks and applications to auctions and computing minima,” in Proceedings of International Conference on Cryptology and Network Security, 2009, pp. 1-20.
-
(2009)
Proceedings of International Conference on Cryptology and Network Security
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
12
-
-
64249101946
-
A proof of security of Yao’s protocol for two-party computation
-
Y. Lindell and B. Pinkas, “A proof of security of Yao’s protocol for two-party computation,” Journal of Cryptology, Vol. 22, 2009, pp. 161-188.
-
(2009)
Journal of Cryptology
, vol.22
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
13
-
-
84940824696
-
Efficient secure similarity computation on encrypted trajectory data
-
A. Liu, K. Zhengy, L. Liz, G. Liu, L. Zhao, and X. Zhou, “Efficient secure similarity computation on encrypted trajectory data,” in Proceedings of the 31st IEEE International Conference on Data Engineering, 2015, pp. 66-77.
-
(2015)
Proceedings of The 31st IEEE International Conference on Data Engineering
, pp. 66-77
-
-
Liu, A.1
Zhengy, K.2
Liz, L.3
Liu, G.4
Zhao, L.5
Zhou, X.6
-
14
-
-
38049034355
-
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
-
T. Nishide and K. Ohta, “Multiparty computation for interval, equality, and comparison without bit-decomposition protocol,” in Proceedings of International Workshop on Public Key Cryptography, 2007, pp. 343-360.
-
(2007)
Proceedings of International Workshop on Public Key Cryptography
, pp. 343-360
-
-
Nishide, T.1
Ohta, K.2
-
16
-
-
84877991754
-
An efficient and probabilistic secure bit-decomposition
-
B. K. Samanthula, H. Chun, and W. Jiang, “An efficient and probabilistic secure bit-decomposition,” in Proceedings of the 8th ACM SIGSAC symposium on Information, Computer and Communications Security, 2013, pp. 541-546.
-
(2013)
Proceedings of The 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 541-546
-
-
Samanthula, B.K.1
Chun, H.2
Jiang, W.3
-
17
-
-
84906500207
-
Privacy-preserving complex query evaluation over semantically secure encrypted data
-
B. K. Samanthula, W. Jiang, and E. Bertino, “Privacy-preserving complex query evaluation over semantically secure encrypted data,” in Proceedings of European Symposium on Research in Computer Security, 2014, pp. 400-418.
-
(2014)
Proceedings of European Symposium on Research in Computer Security
, pp. 400-418
-
-
Samanthula, B.K.1
Jiang, W.2
Bertino, E.3
-
18
-
-
84926455204
-
Social network and tag sources based augmenting collaborative recommender system
-
T. Ma, J. Zhou, M. Tang, and Y. Tian, “Social network and tag sources based augmenting collaborative recommender system,” IEICE Transactions on Information and Systems, Vol. 98, 2015, pp. 902-910.
-
(2015)
IEICE Transactions on Information and Systems
, vol.98
, pp. 902-910
-
-
Ma, T.1
Zhou, J.2
Tang, M.3
Tian, Y.4
-
19
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Z. Fu, K. Ren, J. Shu, and X Sun, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2016, pp. 2546-2559.
-
(2016)
IEEE Transactions on Parallel and Distributed Systems
, vol.27
, pp. 2546-2559
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
-
20
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, Vol. 98, 2015, pp. 190-200.
-
(2015)
IEICE Transactions on Communications
, vol.98
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
21
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2016, pp. 340-352.
-
(2016)
IEEE Transactions on Parallel and Distributed Systems
, vol.27
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
22
-
-
84951770536
-
Secure and controllable k-NN query over encrypted cloud data with key confidentiality
-
Y. W. Zhu, Z. Q. Huang, and T. Takagi, “Secure and controllable k-NN query over encrypted cloud data with key confidentiality,” Journal of Parallel and Distributed Computing, Vol. 89, 2016, pp. 1-12.
-
(2016)
Journal of Parallel and Distributed Computing
, vol.89
, pp. 1-12
-
-
Zhu, Y.W.1
Huang, Z.Q.2
Takagi, T.3
-
23
-
-
84860483528
-
Efficient and side-channel resistant RSA implementation for 8-bit AVR microcontrollers
-
Z. Liu, J. Großschadl, and I. Kizhvatov, “Efficient and side-channel resistant RSA implementation for 8-bit AVR microcontrollers,” in Proceedings of the 1st International Workshop on the Security of the Internet of Things, Vol. 10, 2010, pp. 51-60.
-
(2010)
Proceedings of The 1st International Workshop on The Security of The Internet of Things
, vol.10
, pp. 51-60
-
-
Liu, Z.1
Großschadl, J.2
Kizhvatov, I.3
-
24
-
-
84909640423
-
Low-weight primes for lightweight elliptic curve cryptography on 8-bit processors
-
Z. Liu, J. Großschadl, and D. S. Wong, “Low-weight primes for lightweight elliptic curve cryptography on 8-bit processors,” in Proceedings of International Conference on Information Security and Cryptology, 2013, pp. 217-235.
-
(2013)
Proceedings of International Conference on Information Security and Cryptology
, pp. 217-235
-
-
Liu, Z.1
Großschadl, J.2
Wong, D.S.3
-
25
-
-
84963856290
-
Efficient implementation of NIST compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
-
Z. Liu, H. Seo, J. Großschal, and H. Kim, “Efficient implementation of NIST compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes,” IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, pp. 1385-1397.
-
(2016)
IEEE Transactions on Information Forensics and Security
, vol.11
, pp. 1385-1397
-
-
Liu, Z.1
Seo, H.2
Großschal, J.3
Kim, H.4
-
26
-
-
84894317469
-
The real-time city? Big data and smart urbanism
-
R. Kitchin, “The real-time city? big data and smart urbanism,” GeoJournal, Vol. 79, 2014, pp. 1-14.
-
(2014)
GeoJournal
, vol.79
, pp. 1-14
-
-
Kitchin, R.1
-
27
-
-
84879098109
-
The pursuit of citizens’ privacy: A privacy-aware smart city is possible
-
A. Martínez-Ballesté, P. A. Pérez-Martínez, and A. Solanas, “The pursuit of citizens’ privacy: a privacy-aware smart city is possible,” IEEE Communications Magazine, Vol. 51, 2013, pp. 136-141.
-
(2013)
IEEE Communications Magazine
, vol.51
, pp. 136-141
-
-
Martínez-Ballesté, A.1
Pérez-Martínez, P.A.2
Solanas, A.3
-
28
-
-
84978200144
-
Privacy-preserving k-nearest neighbour query on outsourced database
-
X. Rui, K. Morozov, Y. J. Yang, J. Y. Zhou, and T. Takagi. “Privacy-preserving k-nearest neighbour query on outsourced database,” in Proceedings of Australasian Conference on Information Security and Privacy, LNCS 9722, 2016, pp. 181-197.
-
(2016)
Proceedings of Australasian Conference on Information Security and Privacy, LNCS
, vol.9722
, pp. 181-197
-
-
Rui, X.1
Morozov, K.2
Yang, Y.J.3
Zhou, J.Y.4
Takagi, T.5
-
29
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Y. J. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, Vol. 16, 2015, pp. 317-323.
-
(2015)
Journal of Internet Technology
, vol.16
, pp. 317-323
-
-
Ren, Y.J.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
30
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
J. Shen, H. W. Tan, J. Wang, J. W. Wang, and S. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, Vol. 16, 2015, pp. 171-178.
-
(2015)
Journal of Internet Technology
, vol.16
, pp. 171-178
-
-
Shen, J.1
Tan, H.W.2
Wang, J.3
Wang, J.W.4
Lee, S.5
-
31
-
-
84906330795
-
Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
-
S. D. Xie and Y. X. Wang, “Construction of tree network with limited delivery latency in homogeneous wireless sensor networks,” Wireless Personal Communications, Vol. 78, 2014, pp. 231-246.
-
(2014)
Wireless Personal Communications
, vol.78
, pp. 231-246
-
-
Xie, S.D.1
Wang, Y.X.2
|