-
1
-
-
33646128241
-
Non-interactive watermark detection for a correlation based watermarking scheme
-
Proc. 9th IFIP TC-6 TC-11 Int. Conf. CMS 2005 Communications and Multimedia Security
-
A. Adelsbach, M. Rohe, and A.-R. Sadeghi, "Non-interactive watermark detection for a correlation based watermarking scheme," in Proc. 9th IFIP TC-6 TC-11 Int. Conf. CMS 2005 Communications and Multimedia Security, LNCS 3677, pp. 129-139.
-
LNCS
, vol.3677
, pp. 129-139
-
-
Adelsbach, A.1
Rohe, M.2
Sadeghi, A.-R.3
-
2
-
-
77957001848
-
Additively homomorphic encryption with d-operand multiplications
-
Proc. CRYPTO'10
-
C. Aguilar-Melchor, P. Gaborit, and J. Herranz, "Additively homomorphic encryption with d-operand multiplications," in Proc. CRYPTO'10, LNCS 6223, pp. 138-154.
-
LNCS
, vol.6223
, pp. 138-154
-
-
Aguilar-Melchor, C.1
Gaborit, P.2
Herranz, J.3
-
3
-
-
78650313296
-
A privacycompliant fingerprint recognition system based on homomorphic encryption and fingercode templates
-
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, and F. Scotti, "A privacycompliant fingerprint recognition system based on homomorphic encryption and fingercode templates," in Proc. BTAS 2010 IEEE 4th Int. Conf. Biometrics: Theory, Applications and Systems, 2010, pp. 15-21.
-
(2010)
Proc. BTAS 2010 IEEE 4th Int. Conf. Biometrics: Theory, Applications and Systems
, pp. 15-21
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Di Raimondo, M.4
Donida Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Piva, A.10
Scotti, F.11
-
4
-
-
79957487964
-
Privacypreserving ECG classification with branching programs and neural networks
-
M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Scheider, "Privacypreserving ECG classification with branching programs and neural networks," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 2, pp. 452-468, 2011.
-
(2011)
IEEE Trans. Inform. Forensics Sec
, vol.6
, Issue.2
, pp. 452-468
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Sadeghi, A.-R.4
Scheider, T.5
-
5
-
-
74849111171
-
Encrypted domain DCT based on homomorphic cryptosystems
-
Article ID 716357
-
T. Bianchi, A. Piva, and M. Barni, "Encrypted domain DCT based on homomorphic cryptosystems," EURASIP J. Inform. Sec., vol. 2009, Article ID 716357, 2009.
-
(2009)
EURASIP J. Inform. Sec
, vol.2009
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
6
-
-
60449095773
-
Implementing the discrete Fourier transform in the encrypted domain
-
T. Bianchi, A. Piva, and M. Barni, "Implementing the discrete Fourier transform in the encrypted domain," IEEE Trans. Inform. Forensics Sec., vol. 4, no. 1, pp. 86-97, 2009.
-
(2009)
IEEE Trans. Inform. Forensics Sec
, vol.4
, Issue.1
, pp. 86-97
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
7
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 1, pp. 180-187, 2010.
-
(2010)
IEEE Trans. Inform. Forensics Sec
, vol.5
, Issue.1
, pp. 180-187
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
8
-
-
84856466374
-
(Leveled) fully homomorphic encryption without bootstrapping
-
Z. Brakerski, C. Gentry, and V. Vaikuntanathan, "(Leveled) fully homomorphic encryption without bootstrapping," in Proc. 3rd Innovations in Theoretical Computer Science Conf., 2012, pp. 309-325.
-
(2012)
Proc. 3rd Innovations in Theoretical Computer Science Conf
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
10
-
-
80955132197
-
Fully homomorphic encryption from ring-LWE and security for key dependent messages
-
Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-LWE and security for key dependent messages," in Proc. Advances in Cryptology, (CRYPTO 2011), vol. 6841, p. 501.
-
(2011)
Proc. Advances in Cryptology, CRYPTO
, vol.6841
, pp. 501
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
11
-
-
69949163699
-
Privacy-preserving face recognition
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, R. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Proc. 9th Int. Symp. Privacy Enhancing Tecnologies, 2009, pp. 235-253.
-
(2009)
Proc. 9th Int. Symp. Privacy Enhancing Tecnologies
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, R.5
Toft, T.6
-
12
-
-
85032769323
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Article ID 0313402007
-
Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, "Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing," EURASIP J. Inform. Sec., Article ID 0313402007.
-
EURASIP J. Inform. Sec.
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
13
-
-
85032762657
-
Gram-Schmidt orthogonalization on encrypted vectors
-
Ponza, Italy 6-8 Sept
-
P. Failla and M. Barni, "Gram-Schmidt orthogonalization on encrypted vectors," in Proc. 21st Int. Tyrrhenian Workshop Digital Communications, (ITWDC), Ponza, Italy, 6-8 Sept. 2010.
-
(2010)
Proc. 21st Int. Tyrrhenian Workshop Digital Communications, (ITWDC)
-
-
Failla, P.1
Barni, M.2
-
14
-
-
78149253456
-
ESketch: A privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
-
Rome, Italy 9-10 Sept
-
P. Failla, Y. Sutcu, and M. Barni, "eSketch: A privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics," in Proc. 12th ACM Multimedia and Security Workshop, Rome, Italy, 9-10 Sept. 2010.
-
(2010)
Proc. 12th ACM Multimedia and Security Workshop
-
-
Failla, P.1
Sutcu, Y.2
Barni, M.3
-
15
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
C. Fontaine and F. Galand, "A survey of homomorphic encryption for nonspecialists," EURASIP J. Inform. Sec., vol. 2007, no. 1, pp. 1-15, 2007.
-
(2007)
EURASIP J. Inform. Sec
, vol.2007
, Issue.1
, pp. 1-15
-
-
Fontaine, C.1
Galand, F.2
-
16
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. STOC'09, pp. 169-178.
-
Proc. STOC'09
, pp. 169-178
-
-
Gentry, C.1
-
17
-
-
79957974657
-
Implementing gentry's fully-homomorphic encryption scheme
-
C. Gentry and S. Halevi, "Implementing gentry's fully-homomorphic encryption scheme," in Proc. EUROCRYPT, 2011, pp. 129-148.
-
(2011)
Proc. EUROCRYPT
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
18
-
-
84865518868
-
Homomorphic evaluation of the AES circuit
-
CRYPTO 2012 2012
-
C. Gentry, S. Halevi, and N. P. Smart, "Homomorphic evaluation of the AES circuit," CRYPTO 2012, (LNCS) vol. 7417, 2012, p. 850-867, 2012.
-
(2012)
LNCS
, vol.7417
, pp. 850-867
-
-
Gentry, C.1
Halevi, S.2
Smart, N.P.3
-
19
-
-
77954628604
-
A simple BGN-type cryptosystem from LWE
-
Proc. EUROCRYPT'2010
-
C. Gentry, S. Halevi, and V. Vaikuntanathan, "A simple BGN-type cryptosystem from LWE," in Proc. EUROCRYPT'2010 (LNCS) vol. 6110, pp. 506-522.
-
LNCS
, vol.6110
, pp. 506-522
-
-
Gentry, C.1
Halevi, S.2
Vaikuntanathan, V.3
-
20
-
-
56749170420
-
A buyer-seller watermarking protocol based on secure embedding
-
S. Katzenbeisser, A. Lemma, M. Celik, M. van der Veen, and M. Maas, "A buyer-seller watermarking protocol based on secure embedding," IEEE Trans. Inform. Forensics Sec., vol. 3, no. 4, pp. 783-786, 2008.
-
(2008)
IEEE Trans. Inform. Forensics Sec
, vol.3
, Issue.4
, pp. 783-786
-
-
Katzenbeisser, S.1
Lemma, A.2
Celik, M.3
Veen Der M.Van4
Maas, M.5
-
22
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
DOI 10.1109/TIP.2005.859383
-
M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Processing, vol. 14, no. 12, pp. 2129-2139, 2005. (Pubitemid 41763728)
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
23
-
-
85032751121
-
Encrypted signal processing for privacy protection
-
R. Lagendijk, Z. Erkin, and M. Barni, "Encrypted signal processing for privacy protection," IEEE Signal Processing Mag., vol. 30, no. 1, pp. 82-105, 2013.
-
(2013)
IEEE Signal Processing Mag
, vol.30
, Issue.1
, pp. 82-105
-
-
Lagendijk, R.1
Erkin, Z.2
Barni, M.3
-
24
-
-
84873455869
-
Poster: An implementation of the fully homomorphic Smart-Vercauteren crypto-system
-
H. Perl, M. Brenner, and M. Smith, "Poster: An implementation of the fully homomorphic Smart-Vercauteren crypto-system," in Proc. ACM Conf. Computer and Communications Security, 2011, pp. 837-840.
-
(2011)
Proc. ACM Conf. Computer and Communications Security
, pp. 837-840
-
-
Perl, H.1
Brenner, M.2
Smith, M.3
-
25
-
-
33645680169
-
Zero-knowledge ST-DM watermarking
-
San Jose, CA, 16-19 Jan.
-
A. Piva, V. Cappellini, D. Corazzi, A. D. Rosa, C. Orlandi, and M. Barni, "Zero-knowledge ST-DM watermarking," in Proc. IS&T/SPIE Int. Symp. Electronic Imaging 2006, San Jose, CA, 16-19 Jan. 2006.
-
(2006)
Proc. IS&T/SPIE Int. Symp. Electronic Imaging 2006
-
-
Piva, A.1
Cappellini, V.2
Corazzi, D.3
Rosa, A.D.4
Orlandi, C.5
Barni, M.6
-
27
-
-
77955253445
-
The learning with errors problem (invited survey)
-
10 Dec
-
O. Regev, "The learning with errors problem (invited survey)," in Proc. IEEE Conf. Computational Complexity, 10 Dec. 2010, pp. 191-204.
-
(2010)
Proc. IEEE Conf. Computational Complexity
, pp. 191-204
-
-
Regev, O.1
-
28
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. Demillo, D. Dobkin, A. Jones, and R. Lipton, Eds. New York: Academic
-
R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On data banks and privacy homomorphisms," in Foundations of Secure Computation, R. Demillo, D. Dobkin, A. Jones, and R. Lipton, Eds. New York: Academic, 1978, pp. 169-180.
-
(1978)
Foundations of Secure Computation
, pp. 169-180
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
30
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
EUROCRYPT'2010
-
M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in EUROCRYPT'2010 (LNCS) vol. 6110, pp. 24-43.
-
LNCS
, vol.6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
|