-
2
-
-
85032777835
-
-
Feb. 11 Time Mag. [Online]. Available:
-
T. Grose. (2008, Feb. 11). When surveillance cameras talk. Time Mag. [Online]. Available: http://www.time.com/time/world/article/0,8599,1711972,00. html
-
(2008)
When Surveillance Cameras talk.
-
-
Grose, T.1
-
3
-
-
85032755518
-
-
Aug. 07 Los Angeles Times [Online]. Available:
-
M. Magnier. (2008, Aug. 07). Many eyes will watch visitors. Los Angeles Times [Online]. Available: http://articles.latimes.com/2008/aug/07/world/fg- snoop7
-
(2008)
Many Eyes Will Watch Visitors.
-
-
Magnier, M.1
-
4
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-The-Art and possible extensions
-
DOI 10.1109/TKDE.2005.99
-
G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-The-art and possible extensions," IEEE Trans. Knowledge Data Eng., vol. 17, no. 6, pp. 734-749, 2005. (Pubitemid 40860454)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.6
, pp. 734-749
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
5
-
-
0035509452
-
Privacy risks in recommender systems
-
DOI 10.1109/4236.968832
-
N. Ramakrishnan, B. Keller, B. J. Mirza, A. Y. Grama, and G. Karypis, "Privacy risks in recommender systems," IEEE Internet Comput., vol. 5, no. 6, pp. 54-62, 2001. (Pubitemid 33137916)
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.6
, pp. 54-62
-
-
Ramakrishnan, N.1
Keller, B.J.2
Mirza, B.J.3
Grama, A.Y.4
Karypis, G.5
-
6
-
-
70349216521
-
Secure image retrieval through feature protection
-
Washington, DC
-
W. Lu, A. L. Varna, A. Swaminathan, and M. Wu, "Secure image retrieval through feature protection," in Proc. IEEE Int. Conf. Acoust. Speech Signal Processing (ICASSP), Washington, DC, 2009, pp. 1533-1536.
-
(2009)
Proc. IEEE Int. Conf. Acoust. Speech Signal Processing (ICASSP
, pp. 1533-1536
-
-
Lu, W.1
Varna, A.L.2
Swaminathan, A.3
Wu, M.4
-
7
-
-
78349236191
-
Privacy-preserving approximation of l1 distance for multimedia applications
-
S. Rane, S. Wei, and A. Vetro, "Privacy-preserving approximation of L1 distance for multimedia applications," in Proc. IEEE Int. Conf. Multimedia Expo (ICME), 2010, pp. 492-497.
-
(2010)
Proc. IEEE Int. Conf. Multimedia Expo (ICME
, pp. 492-497
-
-
Rane, S.1
Wei, S.2
Vetro, A.3
-
8
-
-
80054910703
-
Secure and robust iris recognition using random projections and sparse representations
-
Sept
-
J. K. Pillai, V. M. Patel, R. Chellappa, and N. K. Ratha, "Secure and robust IRIS recognition using random projections and sparse representations," IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 9, pp. 1877-1893, Sept. 2011.
-
(2011)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.33
, Issue.9
, pp. 1877-1893
-
-
Pillai, J.K.1
Patel, V.M.2
Chellappa, R.3
Ratha, N.K.4
-
10
-
-
33645680170
-
Blind newton sensitivity attack
-
P. Comesana, L. Perez-Freire, and F. Perez-Gonzalez, "Blind Newton sensitivity attack," IEE Proc. Inform. Security, vol. 153, no. 3, pp. 115-125, 2006.
-
(2006)
IEE Proc. Inform. Security
, vol.153
, Issue.3
, pp. 115-125
-
-
Comesana, P.1
Perez-Freire, L.2
Perez-Gonzalez, F.3
-
11
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
2007/13801
-
C. Fontaine and F. Galand, "A survey of homomorphic encryption for nonspecialists," Eurasip J. Inform. Security, vol. 10.1155/2007/13801, 2007.
-
(2007)
Eurasip J. Inform. Security, vol.
, vol.10
-
-
Fontaine, C.1
Galand, F.2
-
12
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
2007/78943
-
Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, "Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing," Eurasip J. Inform. Security, vol. 0.1155/2007/78943, 2007.
-
(2007)
Eurasip J. Inform. Security, vol.
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.L.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
13
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 1, pp. 180-187, 2010.
-
(2010)
IEEE Trans. Inform. Forensics Sec.
, vol.5
, Issue.1
, pp. 180-187
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
14
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
T. Okamoto and S. Uchiyama, "A new public-key cryptosystem as secure as factoring," in Proc. EUROCRYPT, 1998, pp. 308-318.
-
(1998)
Proc. EUROCRYPT
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
15
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
Oct
-
G. Bassard, D. Chaum, and C. Crepeau, "Minimum disclosure proofs of knowledge," J. Comput. Syst. Sci., vol. 37, no. 2, pp. 156-189, Oct. 1986.
-
(1986)
J. Comput. Syst. Sci.
, vol.37
, Issue.2
, pp. 156-189
-
-
Bassard, G.1
Chaum, D.2
Crepeau, C.3
-
16
-
-
71149116146
-
Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson, "Proofs that yield nothing but their validity for all languages in NP have zero-knowledge proof systems," J. ACM, vol. 38, no. 3, pp. 691-729, 1991.
-
(1991)
J. ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
San Francisco, Aug
-
Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure two-party computation using garbled circuits," in Proc. 20th USENIX Sec. Symp., San Francisco, Aug. 2011.
-
(2011)
Proc. 20th USENIX Sec. Symp.
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
18
-
-
80051628570
-
A new approach to practical active-secure two-party computation
-
vol. arXiv:1202.3052v1 [cs.CR]
-
J. B. Nielsen, P. S. Nordholt, C. Orlandi, and S. S. Burra, "A new approach to practical active-secure two-party computation," Cryptology ePrint Archive, vol. arXiv:1202.3052v1 [cs.CR], 2011.
-
(2011)
Cryptology ePrint Archive
-
-
Nielsen, J.B.1
Nordholt, P.S.2
Orlandi, C.3
Burra, S.S.4
-
19
-
-
74849111171
-
Encrypted domain dct based on homomorphic encryption
-
2009/716357
-
T. Bianchi, A. Piva, and M. Barni, "Encrypted domain DCT based on homomorphic encryption," Eurasip J. Inform. Security, vol. 10.1155/2009/716357, 2009.
-
(2009)
Eurasip J. Inform. Security, vol.
, vol.10
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
20
-
-
60449095773
-
On the implementation of the discrete fourier transform in the encrypted domain
-
Mar
-
T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Trans. Inform. Forensics Sec., vol. 4, no. 1, pp. 86-97, Mar. 2009.
-
(2009)
IEEE Trans. Inform. Forensics Sec.
, vol.4
, Issue.1
, pp. 86-97
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
21
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
New York
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. Theory Comput., New York, 2009, pp. 169-178.
-
(2009)
Proc. 41st Annu. ACM Symp. Theory Comput.
, pp. 169-178
-
-
Gentry, C.1
-
22
-
-
80051986706
-
Fully homomorphic encryption from ring-lwe and security for key dependent messages
-
CRYPTO
-
Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-lwe and security for key dependent messages," in Proc. Advances Cryptology, CRYPTO, 2011, pp. 505-524.
-
(2011)
Proc. Advances Cryptology
, pp. 505-524
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
23
-
-
79957991215
-
Implementing gentry's fully-homomorphic encryption scheme
-
[Online]. Available:
-
C. Gentry and S. Halevi, "Implementing gentry's fully-homomorphic encryption scheme," Cryptology ePrint Archive Rep. 520, 2010 [Online]. Available: http://eprint.iacr.org
-
(2010)
Cryptology ePrint Archive Rep.
, vol.520
-
-
Gentry, C.1
Halevi, S.2
-
25
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
London, U.K
-
R. Cramer, I. Damgård, and J. B. Nielsen, "Multiparty computation from threshold homomorphic encryption," in Proc. Int. Conf. Theory Appl. Cryptographic Tech. (EUROCRYPT), London, U.K., 2001, pp. 280-299.
-
(2001)
Proc. Int. Conf. Theory Appl. Cryptographic Tech. (EUROCRYPT
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
27
-
-
0041783510
-
Privacy-preserving data mining
-
May
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," SIGMOD Rec., vol. 29, no. 2, pp. 439-450, May 2000.
-
(2000)
SIGMOD Rec.
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
28
-
-
0026065565
-
Eigenfaces for recognition
-
M. A. Turk and A. P. Pentland, "Eigenfaces for recognition," J. Cognitive Neurosci., vol. 3, no. 1, pp. 71-86, 1991.
-
(1991)
J. Cognitive Neurosci.
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.A.1
Pentland, A.P.2
-
30
-
-
69949163699
-
Privacy-preserving face recognition
-
Seattle, Aug
-
Z. Erkin, M. Franz, S. Katzenbeisser, J. Guajardo, R. L. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Proc. Symp. Privacy Enhanced Technol., Seattle, Aug. 2009, pp. 235-253.
-
(2009)
Proc. Symp. Privacy Enhanced Technol.
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Katzenbeisser, S.3
Guajardo, J.4
Lagendijk, R.L.5
Toft, T.6
-
32
-
-
77955178939
-
Scifi: A system for secure face identification
-
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, "Scifi: A system for secure face identification," in Proc. IEEE Symp. Security Privacy, 2010, pp. 239-254.
-
(2010)
Proc. IEEE Symp. Security Privacy
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
33
-
-
20844455524
-
Enabling video privacy through computer vision
-
DOI 10.1109/MSP.2005.65
-
A. Senior, A. Oankanti, and A. Hampapur, "Enabling video privacy through computer vision," IEEE Security Privacy Mag., vol. 3, no. 3, pp. 50-57, 2005. (Pubitemid 40860473)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Shu, C.F.8
Lu, M.9
-
35
-
-
33947164049
-
PICO: Privacy through invertible cryptographic obscuration
-
DOI 10.1109/CVIIE.2005.16, 1623767, Computer Vision for Interactive and Intelligent Environments 2005
-
T. Boult, "Pico: Privacy through invertible cryptographic obscuration," Comput. Vision Interactive Intell. Environ., 0-7695-2524-5, pp. 27-38, 2005. (Pubitemid 46401992)
-
(2005)
Computer Vision for Interactive and Intelligent Environments 2005
, vol.2005
, pp. 27-38
-
-
Boult, T.E.1
-
36
-
-
14644429006
-
Preserving privacy by de-identifying face images
-
DOI 10.1109/TKDE.2005.32
-
E. M. Newton, L. Sweeney, and B. Malin, "Preserving privacy by de-identifying face images," IEEE Trans. Knowledge Data Eng., vol. 17, no. 2, pp. 232-243, 2005. (Pubitemid 40320181)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.2
, pp. 232-243
-
-
Newton, E.M.1
Sweeney, L.2
Malin, B.3
-
37
-
-
51349121612
-
Respectful cameras: Detecting visual markers in realtime to address privacy concerns
-
J. Schiff, M. Meingast, D. Mulligan, S. Sastry, and K. Goldberg, "Respectful cameras: Detecting visual markers in realtime to address privacy concerns," in Proc. Int. Conf. Intell. Robots Syst., 2007, pp. 971-978.
-
(2007)
Proc. Int. Conf. Intell. Robots Syst.
, pp. 971-978
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.3
Sastry, S.4
Goldberg, K.5
-
38
-
-
84893405732
-
Data clustering: A review
-
A. K. Jain, M. N. Murty, and P. J. Flynn, "Data clustering: A review," ACM Comput. Surveys, vol. 31, no. 3, pp. 264-323, 1999.
-
(1999)
ACM Comput. Surveys
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
41
-
-
11844281385
-
State-of-The-Art in privacy preserving data mining
-
DOI 10.1145/974121.974131
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis, "State-of-The-art in privacy preserving data mining," SIGMOD Rec., vol. 33, no. 1, pp. 50-57, 2004. (Pubitemid 40290240)
-
(2004)
SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
46
-
-
26444451487
-
On private scalar product computation for privacy-preserving data mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, "On private scalar product computation for privacy-preserving data mining," in Proc. 7th Int. Conf. Inform. Security Cryptology, 2004, pp. 2-3.
-
(2004)
Proc. 7th Int. Conf. Inform. Security Cryptology
, pp. 2-3
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
47
-
-
35048899833
-
Achieving privacy preservation when sharing data for clustering
-
New York: Springer
-
S. R. M. Oliveira and O. R. Zaiane, "Achieving privacy preservation when sharing data for clustering," Lecture Notes in Computer Science, New York: Springer, 2004, pp. 67-82.
-
(2004)
Lecture Notes in Computer Science
, pp. 67-82
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
-
48
-
-
77949788539
-
Privacy-preserving user clustering in a social network
-
Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, "Privacy- preserving user clustering in a social network," in Proc. 1st IEEE Workshop Inform. Forensics Security, 2009, pp. 96-100.
-
(2009)
Proc. 1st IEEE Workshop Inform. Forensics Security
, pp. 96-100
-
-
Erkin, Z.1
Veugen, T.2
Toft, T.3
Lagendijk, R.L.4
-
49
-
-
84856425829
-
Efficient privacy preserving k-means clustering in a three-party setting
-
M. R. T. Beye, Z. Erkin, and R. L. Lagendijk, "Efficient privacy preserving k-means clustering in a three-party setting," in Proc. IEEE Workshop Inform. Forensics Security, 2011, pp. 1-6.
-
(2011)
Proc. IEEE Workshop Inform. Forensics Security
, pp. 1-6
-
-
Beye, M.R.T.1
Erkin, Z.2
Lagendijk, R.L.3
-
50
-
-
85052617391
-
Item-based collaborative filtering recommendation algorithms
-
B. Sarwar, G. Karypis, J. Konstan, and J. Reidl, "Item-based collaborative filtering recommendation algorithms," in Proc. 10th Int. Conf. World Wide Web, 2001, pp. 285-295.
-
(2001)
Proc. 10th Int. Conf. World Wide Web
, pp. 285-295
-
-
Sarwar, B.1
Karypis, G.2
Konstan, J.3
Reidl, J.4
-
51
-
-
3042821101
-
Item-based top-n recommendation algorithms
-
M. Deshpande and G. Karypis, "Item-based top-N recommendation algorithms," ACM Trans. Inform Syst., vol. 22, no. 1, pp. 143-177, 2004.
-
(2004)
ACM Trans. Inform Syst.
, vol.22
, Issue.1
, pp. 143-177
-
-
Deshpande, M.1
Karypis, G.2
-
52
-
-
33644514610
-
Svd-based collaborative filtering with privacy
-
New York
-
H. Polat and W. Du, "SVD-based collaborative filtering with privacy," in Proc. ACM Symp. Appl. Comput., New York, 2005, pp. 791-795.
-
(2005)
Proc. ACM Symp. Appl. Comput.
, pp. 791-795
-
-
Polat, H.1
Du, W.2
-
53
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques," in Proc. IEEE Int. Conf. Data Mining, 2003, pp. 625-628.
-
(2003)
Proc. IEEE Int. Conf. Data Mining
, pp. 625-628
-
-
Polat, H.1
Du, W.2
-
55
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
-
M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, "Private collaborative forecasting and benchmarking," in Proc. ACM Workshop Privacy Electron. Soc., 2004, pp. 103-114. (Pubitemid 40821100)
-
(2004)
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
, pp. 103-114
-
-
Atallah, M.1
Bykova, M.2
Li, J.3
Frikken, K.4
Topkara, M.5
-
56
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
J. F. Canny, "Collaborative filtering with privacy via factor analysis," in Proc. ACM SIGIR, 2002, pp. 238-245.
-
(2002)
Proc. ACM SIGIR
, pp. 238-245
-
-
Canny, J.F.1
-
58
-
-
80051602733
-
Efficiently computing private recommendations
-
Z. Erkin, M. R. T. Beye, T. Veugen, and R. L. Lagendijk, "Efficiently computing private recommendations," in Proc. Int. Conf. Acoust. Speech Signal Processing, 2011, pp. 5864-5867.
-
(2011)
Proc. Int. Conf. Acoust. Speech Signal Processing
, pp. 5864-5867
-
-
Erkin, Z.1
Beye, M.R.T.2
Veugen, T.3
Lagendijk, R.L.4
-
59
-
-
84861133582
-
Generating private recommendations efficiently using homomorphic encryption and data packing
-
Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, "Generating private recommendations efficiently using homomorphic encryption and data packing," IEEE Trans. Inform. Forensics Security, vol. 7, no. 3, pp. 1053-1066, 2012.
-
(2012)
IEEE Trans. Inform. Forensics Security
, vol.7
, Issue.3
, pp. 1053-1066
-
-
Erkin, Z.1
Veugen, T.2
Toft, T.3
Lagendijk, R.L.4
-
60
-
-
84856450939
-
Outsourcing multi-party computation
-
[Online]. Available:
-
S. Kamara, P. Mohassel, and M. Raykova, "Outsourcing multi-party computation," Cryptology ePrint Archive Rep. 272, 2011 [Online]. Available: http://eprint.iacr.org
-
Cryptology ePrint Archive Rep.
, vol.272
, pp. 2011
-
-
Kamara, S.1
Mohassel, P.2
Raykova, M.3
-
61
-
-
77949846904
-
Efficient privacy-preserving classification of ecg signals
-
M. Barni, P. Failla, R. Lazzeretti, A. Paus, A.-R. Sadeghi, T. Schneider, and V. Kolesnikov, "Efficient privacy-preserving classification of ECG signals," in Proc. 1st IEEE Workshop Inform. Forensics Security, 2009, pp. 91-95.
-
(2009)
Proc. 1st IEEE Workshop Inform. Forensics Security
, pp. 91-95
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Paus, A.4
Sadeghi, A.-R.5
Schneider, T.6
Kolesnikov, V.7
-
62
-
-
79957487964
-
Privacy-preserving ecg classification with branching programs and neural networks
-
June
-
M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, "Privacy-preserving ECG classification with branching programs and neural networks," IEEE Trans. Inform. Forensics Security, vol. 6, no. 2, pp. 452-468, June 2011.
-
(2011)
IEEE Trans. Inform. Forensics Security
, vol.6
, Issue.2
, pp. 452-468
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Sadeghi, A.-R.4
Schneider, T.5
-
63
-
-
57049083569
-
Privacy preserving error resilient dna searching through oblivious automata
-
J. R. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik, "Privacy preserving error resilient DNA searching through oblivious automata," in Proc. 14th ACM Conf. Comput. Commun. Security, 2007, pp. 519-528.
-
(2007)
Proc. 14th ACM Conf. Comput. Commun. Security
, pp. 519-528
-
-
Troncoso-Pastoriza, J.R.1
Katzenbeisser, S.2
Celik, M.3
-
64
-
-
74049087814
-
Privacypreserving genomic computation through program specialization
-
New York
-
R. Wang, X. F. Wang, Z. Li, H. X. Tang, M. K. Reiter, and Z. Dong, "Privacypreserving genomic computation through program specialization, " in Proc. 16th ACM Conf. Comput. Commun. Security (CCS), New York, 2009, pp. 338-347.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security (CCS
, pp. 338-347
-
-
Wang, R.1
Wang, X.F.2
Li, Z.3
Tang, H.X.4
Reiter, M.K.5
Dong, Z.6
-
65
-
-
84923318201
-
Efficient privacy-preserving biometric identification
-
Security Conf
-
Y. Huang, L. Malka, D. Evans, and J. Katz, "Efficient privacy-preserving biometric identification," in Proc. 18th Network Distributed Syst. Security Conf., 2011.
-
(2011)
Proc. 18th Network Distributed Syst
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
66
-
-
1342275940
-
-
London, U.K.: Springer-Verlag
-
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. London, U.K.: Springer-Verlag, 2009.
-
(2009)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
67
-
-
78650313296
-
A privacycompliant fingerprint recognition system based on homomorphic encryption and fingercode templates
-
Washington DC
-
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, and F. Scotti, "A privacycompliant fingerprint recognition system based on homomorphic encryption and fingercode templates," in Proc. IEEE 4th Int. Conf. Biometrics Theory Appl. Syst., Washington DC, 2010, pp. 1-7.
-
(2010)
Proc. IEEE 4th Int. Conf. Biometrics Theory Appl. Syst.
, pp. 1-7
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Di Raimondo, M.4
Donida Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Piva, A.10
Scotti, F.11
-
68
-
-
0033730804
-
Filterbank-based fingerprint matching
-
A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, "Filterbank- based fingerprint matching," IEEE Trans. Image Processing, vol. 9, no. 5, pp. 846-859, 2000.
-
(2000)
IEEE Trans. Image Processing
, vol.9
, Issue.5
, pp. 846-859
-
-
Jain, A.K.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
69
-
-
78149266544
-
Privacypreserving fingercode authentication
-
Rome
-
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, and F. Scotti, "Privacypreserving fingercode authentication," in Proc. ACM Multimedia Security Workshop, Rome, 2010, pp. 231-240.
-
(2010)
Proc. ACM Multimedia Security Workshop
, pp. 231-240
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Di Raimondo, M.4
Donida Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Piva, A.10
Scotti, F.11
-
70
-
-
0742290132
-
How iris recognition works
-
J. Daugman, "How iris recognition works," IEEE Trans. Circuits Syst. Video Technol., vol. 4, no. 1, pp. 21-30, 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.4
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
71
-
-
84875863247
-
An efficient protocol for private iris-code matching by means of garbled circuits
-
Y. Luo, S. C. Samson Cheung, T. Pignata, R. Lazzeretti, and M. Barni, "An efficient protocol for private iris-code matching by means of garbled circuits," in Proc. IEEE Int. Conf. Image Processing, 2012.
-
(2012)
Proc. IEEE Int. Conf. Image Processing
-
-
Luo, Y.1
Samson Cheung, S.C.2
Pignata, T.3
Lazzeretti, R.4
Barni, M.5
-
73
-
-
0034266804
-
Watermarking digital image and video data: A state-of-The-art overview
-
G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, "Watermarking digital image and video data: A state-of-The-art overview," IEEE Signal Processing Mag., vol. 17, no. 5, pp. 20-46, 2000.
-
(2000)
IEEE Signal Processing Mag.
, vol.17
, Issue.5
, pp. 20-46
-
-
Langelaar, G.C.1
Setyawan, I.2
Lagendijk, R.L.3
-
74
-
-
0030409662
-
A method for signature casting on digital images
-
I. Pitas, "A method for signature casting on digital images," in Proc. IEEE Int. Conf. Image Processing, 1996, vol. III, pp. 215-218.
-
(1996)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 215-218
-
-
Pitas, I.1
-
76
-
-
84944404911
-
Zero-Knowledge Watermark Detection and Proof of Ownership
-
Information Hiding
-
A. Adelsbach and A.-R. Sadeghi, "Zero-knowledge watermark detection and proof of ownership.," in Proc. Int. Workshop Inform. Hiding, 2001, pp. 273-288. (Pubitemid 33367673)
-
(2001)
Lecture Notes In Computer Science
, Issue.2137
, pp. 273-288
-
-
Adelsbach, A.1
Sadeghi, A.-R.2
-
77
-
-
1442357607
-
Watermark detection with zero-knowledge disclosure
-
A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, "Watermark detection with zero-knowledge disclosure," ACM Multimedia Syst. J. vol. 9, no. 3, pp. 266-278, 2003.
-
(2003)
ACM Multimedia Syst. J.
, vol.9
, Issue.3
, pp. 266-278
-
-
Adelsbach, A.1
Katzenbeisser, S.2
Sadeghi, A.-R.3
-
79
-
-
84957353052
-
Anonymous Fingerprinting
-
Advances in Cryptology - Eurocrypt '97
-
B. Pfitzmann and M. Waidner, "Anonymous fingerprinting," in Proc. Eurocrypt, 1997, vol. 1233, pp. 88-102. (Pubitemid 127067796)
-
(1997)
Lecture Notes In Computer Science
, Issue.1233
, pp. 88-102
-
-
Pfitzmann, B.1
Waidner, M.2
-
80
-
-
84937405827
-
Anonymous fingerprinting with direct non-repudiation
-
B. Pfitzmann and A.-R. Sadeghi, "Anonymous fingerprinting with direct non-repudiation," in Proc. Asiacrypt, 2000, vol. 1976, pp. 401-414.
-
(2000)
Proc. Asiacrypt
, vol.1976
, pp. 401-414
-
-
Pfitzmann, B.1
Sadeghi, A.-R.2
-
81
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
DOI 10.1109/TIP.2005.859383
-
M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Processing, vol. 14, no. 12, pp. 2129-2139, 2005. (Pubitemid 41763728)
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
84
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
K. Kursawe, G. Danezis, and M. Kohlweiss, "Privacy-friendly aggregation for the smart-grid," in Proc. Symp. Privacy Enhanced Technol., 2011, pp. 175-191.
-
(2011)
Proc. Symp. Privacy Enhanced Technol.
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
86
-
-
85075489334
-
Privacy-preserving aggregation of time-series data
-
E. Shi, T.-H. Chan, E. G. Rieffel, R. Chow, and D. Song, "Privacy-preserving aggregation of time-series data," in Proc. 18th Annu. Netw. Distributed Syst. Security Symp., 2011.
-
(2011)
Proc. 18th Annu. Netw. Distributed Syst. Security Symp.
-
-
Shi, E.1
Chan, T.-H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
87
-
-
84863479013
-
Private computation of spatial and temporal power consumption with smart meters
-
Z. Erkin and G. Tsudik, "Private computation of spatial and temporal power consumption with smart meters," in Proc. Int. Conf. Applied Cryptography Network Security, 2012, pp. 561-577.
-
(2012)
Proc. Int. Conf. Applied Cryptography Network Security
, pp. 561-577
-
-
Erkin, Z.1
Tsudik, G.2
-
88
-
-
80054080910
-
Privacy-friendly energy-metering via homomorphic encryption
-
LNCS 6710
-
F. D. Garcia and B. Jacobs, "Privacy-friendly energy-metering via homomorphic encryption," in Proc. 6th Workshop Security Trust Manage., 2010, LNCS 6710, pp. 226-238.
-
(2010)
Proc. 6th Workshop Security Trust Manage.
, pp. 226-238
-
-
Garcia, F.D.1
Jacobs, B.2
-
89
-
-
84872766866
-
I have a dream! (differentially private smart metering)
-
LNCS
-
G. Acs and C. Castelluccia, "I have a DREAM! (differentially private smart metering)," in Proc. Inform. Hiding Conf., 2011, LNCS, pp. 1-10.
-
(2011)
Proc. Inform. Hiding Conf.
, pp. 1-10
-
-
Acs, G.1
Castelluccia, C.2
-
90
-
-
70350754250
-
Design for values and values for design
-
M. J. van den Hoven, "Design for values and values for design," Inform. Age, vol. 7, no. 2, pp. 4-7, 2005.
-
(2005)
Inform. Age
, vol.7
, Issue.2
, pp. 4-7
-
-
Van Den Hoven, M.J.1
-
91
-
-
71549146406
-
A new approach for algebraically homomorphic encryption
-
[Online]. Available:
-
F. Armknecht and A.-R. Sadeghi, "A new approach for algebraically homomorphic encryption," Cryptology ePrint Archive Rep. 422, 2008 [Online]. Available: http://eprint.iacr.org/
-
(2008)
Cryptology ePrint Archive Rep.
, vol.422
-
-
Armknecht, F.1
Sadeghi, A.-R.2
-
92
-
-
85032781606
-
-
[Online]. Available:
-
[Online]. Available: http://www.i-programmer.info/news/112-Theory/2330- darpa-spends-20-million-on-homomorphic-encryption.html (2009).
-
(2009)
-
-
-
94
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
I. Damgård, M. Geisler, and M. Krøigård, "Homomorphic encryption and secure comparison," Int. J. Appl. Cryptography, vol. 1, no. 1, pp. 22-31, 2008.
-
(2008)
Int. J. Appl. Cryptography
, vol.1
, Issue.1
, pp. 22-31
-
-
Damgård, I.1
Geisler, M.2
Krøigård, M.3
-
95
-
-
38149074802
-
Efficient and secure comparison for on-line auctions
-
LNCS 4586
-
I. Damgård, M. Geisler, and M. Krøigård, "Efficient and secure comparison for on-line auctions," in Proc. Australasian Conf. Inform. Security Privacy, 2007, LNCS 4586, pp. 416-430.
-
(2007)
Proc. Australasian Conf. Inform. Security Privacy
, pp. 416-430
-
-
Damgård, I.1
Geisler, M.2
Krøigård, M.3
-
96
-
-
69949126271
-
A correction to 'efficient and secure comparison for on-line auctions
-
[Online]. Available:
-
I. Damgård, M. Geisler, and M. Krøigård, "A correction to 'Efficient and secure comparison for on-line auctions,'" Cryptology ePrint Archive Rep. 321, 2008 [Online]. Available: http://eprint.iacr.org/
-
(2008)
Cryptology ePrint Archive Rep.
, vol.321
-
-
Damgård, I.1
Geisler, M.2
Krøigård, M.3
-
97
-
-
73849126104
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Y. Aumann and Y. Lindell, "Security against covert adversaries: Efficient protocols for realistic adversaries," J. Cryptology, vol. 23, no. 2, pp. 281-343, 2010.
-
(2010)
J. Cryptology
, vol.23
, Issue.2
, pp. 281-343
-
-
Aumann, Y.1
Lindell, Y.2
-
99
-
-
33645492588
-
-
Data Encryption Standard (DES) Number FIPS PUB 46-3, Nat. Inst. of Standards and Technol., Gaithersburg, MD
-
Data Encryption Standard (DES), Number FIPS PUB 46-3, Federal Information Processing Standards Publication, Nat. Inst. of Standards and Technol., Gaithersburg, MD, 1999.
-
(1999)
Federal Information Processing Standards Publication
-
-
-
100
-
-
33645492588
-
-
Advanced Encryption Standard (AES), National Institute of Standards and Technology, Gaithersburg, MD
-
Advanced Encryption Standard (AES), Federal Information Processing Standards Publication, National Institute of Standards and Technology, Gaithersburg, MD, 2001.
-
(2001)
Federal Information Processing Standards Publication
-
-
-
101
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signature and public-key cryptosystems," Commun. Assoc. Comput. Mach., vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
102
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
103
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
LNCS 1592
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Advances Cryptology (EUROCRYPT), 1999, LNCS 1592, pp. 223-238.
-
(1999)
Proc. Advances Cryptology (EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
104
-
-
85050160774
-
Probabilistic encryption and how to play mental poker keeping secret all partial information
-
S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all partial information," in Proc. ACM Symp. Theory Comput., 1982, pp. 365-377.
-
(1982)
Proc. ACM Symp. Theory Comput.
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
105
-
-
33750037945
-
Conditional encrypted mapping and comparing encrypted numbers
-
Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers
-
I. F. Blake and V. Kolesnikov, "Conditional encrypted mapping and comparing encrypted numbers," in Proc. Financial Cryptography Data Security, 2006, LNCS 4107, pp. 206-220. (Pubitemid 44577291)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4107
, pp. 206-220
-
-
Blake, I.F.1
Kolesnikov, V.2
-
106
-
-
38049064946
-
Practical and secure solutions for integer comparison
-
LNCS 4450
-
J. A. Garay, B. Schoenmakers, and J. Villegas, "Practical and secure solutions for integer comparison," in Proc. Public Key Cryptography, 2007, LNCS 4450, pp. 330-342.
-
(2007)
Proc. Public Key Cryptography
, pp. 330-342
-
-
Garay, J.A.1
Schoenmakers, B.2
Villegas, J.3
-
107
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
M. Naor, B. Pinkas, and R. Sumner, "Privacy preserving auctions and mechanism design," in Proc. ACM Conf. Electron. Commerce, 1999, pp. 129-139.
-
(1999)
Proc. ACM Conf. Electron. Commerce
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
108
-
-
26444507172
-
Practical biometric authentication with template protection
-
Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. Jan Schrijen, A. M. Bazen, and R. N. J. Veldhuis, "Practical biometric authentication with template protection," in Proc. Int. Conf. Audio-Video-Based Biometric Person Authentication, 2005, LNCS 3546, pp. 436-446. (Pubitemid 41423060)
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
109
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
LNCS
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, "Improved garbled circuit building blocks and applications to auctions and computing minima," in Proc. 8th Int. Conf. Cryptology Network Security, 2009, LNCS, pp. 1-20.
-
(2009)
Proc. 8th Int. Conf. Cryptology Network Security
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
|