-
1
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
Rome, Italy, Sept
-
M. Barni, T. Bianchi, D. Catalano, M. Raimondo, R. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, "Privacy-preserving fingercode authentication," in Proc. ACM Workshop Multimedia and Security (MMSEC2010), Rome, Italy, Sept. 2010, pp. 231-240.
-
(2010)
Proc. ACM Workshop Multimedia and Security (MMSEC2010)
, pp. 231-240
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Raimondo, M.4
Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Scotti, F.10
Piva, A.11
-
2
-
-
80053027350
-
Secure and efficient protocols for iris and fingerprint identification
-
Leuven, Belgium, Sept
-
M. Blanton and P. Gasti, "Secure and efficient protocols for iris and fingerprint identification," in Proc. European Symp. Research Computer Security (ESORICS), Leuven, Belgium, Sept. 2011, pp. 190-209.
-
(2011)
Proc. European Symp. Research Computer Security (ESORICS)
, pp. 190-209
-
-
Blanton, M.1
Gasti, P.2
-
3
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
Seoul, Korea Dec
-
A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacy-preserving face recognition," in Proc. Int. Conf. Information Security and Cryptology (ICISC '09), Seoul, Korea, Dec. 2009, pp. 229-244.
-
(2009)
Proc. Int. Conf. Information Security and Cryptology (ICISC '09)
, pp. 229-244
-
-
Sadeghi, A.1
Schneider, T.2
Wehrenberg, I.3
-
4
-
-
69949163699
-
Privacy-preserving face recognition
-
Seattle, WA Aug
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, R. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Proc. Int. Symp. Privacy Enhancing Technologies (PET), Seattle, WA, Aug. 2009, pp. 235-253.
-
(2009)
Proc. Int. Symp. Privacy Enhancing Technologies (PET)
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, R.5
Toft, T.6
-
5
-
-
80051602733
-
Efficiently computing private recommendations
-
Prague, Czech Republic, May
-
Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk, "Efficiently computing private recommendations," in Proc. Int. Conf. Acoustic, Speech and Signal Processing (ICASSP), Prague, Czech Republic, May 2011, pp. 5864-5867.
-
(2011)
Proc. Int. Conf. Acoustic, Speech and Signal Processing (ICASSP)
, pp. 5864-5867
-
-
Erkin, Z.1
Beye, M.2
Veugen, T.3
Lagendijk, R.L.4
-
6
-
-
84867598353
-
Privacy-preserving speaker verification as password matching
-
Kyoto, Japan, Mar
-
M. Pathak and B. Raj, "Privacy-preserving speaker verification as password matching," in Proc. Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, Mar. 2012.
-
(2012)
Proc. Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)
-
-
Pathak, M.1
Raj, B.2
-
7
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology, EUROCRYPT 99 New York: Springer
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology, EUROCRYPT 99 (Lecture Notes in Computer Science, vol. 1592). New York: Springer, 1999, pp. 233-238.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 233-238
-
-
Paillier, P.1
-
8
-
-
1642379074
-
Dense probabilistic encryption
-
Kingston, ON, Canada May
-
J. Benaloh, "Dense probabilistic encryption," in Proc. Workshop Selected Areas of Cryptography, Kingston, ON, Canada, May 1994, pp. 120-128.
-
(1994)
Proc. Workshop Selected Areas of Cryptography
, pp. 120-128
-
-
Benaloh, J.1
-
9
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Public Key Cryptography
-
I. Damgård and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," in Proc. 4th Int. Workshop Practice and Theory Public Key Cryptosystems, Cheju Island, Korea, Feb. 2001, pp. 119-136. (Pubitemid 33232937)
-
(2001)
Lecture Notes in Computer Science
, Issue.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
10
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. El-Gamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469-472, July 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El-Gamal, T.1
-
11
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts," in Proc. Theory Cryptography Conf., 2005, pp. 325-341. (Pubitemid 41231172)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
12
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
Mar.
-
C. Gentry, "Computing arbitrary functions of encrypted data," Commun. ACM, vol. 53, no. 3, pp. 97-105, Mar. 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
13
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Advances in Cryptology-EUROCRYPT 2010 H. Gilbert, Ed. New York: Springer
-
M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in Advances in Cryptology-EUROCRYPT 2010 (Lecture Notes in Computer Science, vol. 6110), H. Gilbert, Ed. New York: Springer, 2010, pp. 24-43.
-
(2010)
Lecture Notes in Computer Science
, vol.6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
14
-
-
85032751754
-
Recent advances in fully homomorphic encryption
-
C. Aguilar-Melchor, S. Fau, C. Fontaine, G. Gogniat, and R. Sirdey, "Recent advances in fully homomorphic encryption," IEEE Signal Process. Mag., vol. 30, no. 2, pp. 108-117, 2012.
-
(2012)
IEEE Signal Process. Mag
, vol.30
, Issue.2
, pp. 108-117
-
-
Aguilar-Melchor, C.1
Fau, S.2
Fontaine, C.3
Gogniat, G.4
Sirdey, R.5
-
15
-
-
51849103902
-
Privacy preserving nearest neighbor search
-
Washington, DC
-
M. Shaneck, Y. Kim, and V. Kumar, "Privacy preserving nearest neighbor search," in Proc. Sixth IEEE Int. Conf. Data Mining Workshops, Washington, DC, 2006, pp. 541-545.
-
(2006)
Proc. Sixth IEEE Int. Conf. Data Mining Workshops
, pp. 541-545
-
-
Shaneck, M.1
Kim, Y.2
Kumar, V.3
-
18
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
Chicago, IL, May
-
J. Kilian, "Founding cryptography on oblivious transfer," in Proc. ACM Symp. Theory Computing, Chicago, IL, May 1988, pp. 20-31.
-
(1988)
Proc. ACM Symp. Theory Computing
, pp. 20-31
-
-
Kilian, J.1
-
19
-
-
70449490535
-
Multiparty computation, an introduction
-
New York: Springer
-
R. Cramer and I. Damgård, "Multiparty computation, an introduction," in Contemp. Cryptol. New York: Springer, pp. 41-87, 2005.
-
(2005)
Contemp. Cryptol
, pp. 41-87
-
-
Cramer, R.1
Damgård, I.2
-
20
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Feb
-
V. I. Levenshtein, "Binary codes capable of correcting deletions, insertions, and reversals," Soviet Phys. Doklady, vol. 10, no. 8, pp. 707-710, Feb. 1966.
-
(1966)
Soviet Phys. Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.I.1
-
21
-
-
1642327704
-
Secure and private sequence comparisons
-
Washington, DC Oct
-
M. Atallah, F. Kerschbaum, and W. Du, "Secure and private sequence comparisons," in Proc. 2003 ACM Workshop Privacy Electronic Society, Washington, DC, Oct. 2003, pp. 39-44.
-
(2003)
Proc. 2003 ACM Workshop Privacy Electronic Society
, pp. 39-44
-
-
Atallah, M.1
Kerschbaum, F.2
Du, W.3
-
23
-
-
73649111765
-
Performance comparison of secure comparison protocols
-
DEXA'09
-
F. Kerschbaum, D. Biswas, and S. de Hoogh, "Performance comparison of secure comparison protocols," in Proc. 20th Int. Workshop Database and Expert Systems Application, 2009, DEXA'09, pp. 133-136.
-
(2009)
Proc. 20th Int. Workshop Database and Expert Systems Application
, pp. 133-136
-
-
Kerschbaum, F.1
Biswas, D.2
De Hoogh, S.3
-
24
-
-
49049099825
-
Improved garbled circuit: Free xor gates and applications
-
Reykjavik, Iceland July
-
V. Kolesnikov and T. Schneider, "Improved garbled circuit: Free xor gates and applications," in Proc. Int. Colloq. Automata, Languages and Programming (ICALP), Reykjavik, Iceland, July 2008, pp. 486-498.
-
(2008)
Proc. Int. Colloq. Automata, Languages and Programming (ICALP)
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
25
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
Kanazawa, Japan Dec
-
V. Kolesnikov, A. Sadeghi, and T. Schneider, "Improved garbled circuit building blocks and applications to auctions and computing minima," in Proc. Cryptology and Network Security (CANS), Kanazawa, Japan, Dec. 2009, pp. 1-20.
-
(2009)
Proc. Cryptology and Network Security (CANS)
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.2
Schneider, T.3
-
26
-
-
85032751121
-
Encrypted signal processing for privacy protection
-
Jan.
-
I. Lagendijk, Z. Erkin, and M. Barni, "Encrypted signal processing for privacy protection," IEEE Signal Process. Mag., vol. 30, no. 1, pp. 85-102, Jan. 2013.
-
(2013)
IEEE Signal Process. Mag
, vol.30
, Issue.1
, pp. 85-102
-
-
Lagendijk, I.1
Erkin, Z.2
Barni, M.3
-
27
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in Proc. ACM Symp. Theory Computing, 1988, pp. 1-10.
-
(1988)
Proc. ACM Symp. Theory Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
28
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crépeau, and I. Damgard, "Multiparty unconditionally secure protocols," in Proc. ACM Symp. Theory Computing, 1988, pp. 11-19.
-
(1988)
Proc. ACM Symp. Theory Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
29
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
84873943605
-
A full proof of the BGW protocol for perfectlysecure multiparty computation
-
New York: Springer, Santa Barbara, CA
-
G. Asharov and Y. Lindell, "A full proof of the BGW protocol for perfectlysecure multiparty computation," in Advances in Cryptology (CRYPTO 2011), New York: Springer, Santa Barbara, CA, 2011.
-
(2011)
Advances in Cryptology (CRYPTO 2011)
-
-
Asharov, G.1
Lindell, Y.2
-
32
-
-
84957356475
-
Efficient Cryptographic Protocols Based on Noisy Channels
-
Advances in Cryptology - Eurocrypt '97
-
C. Crépeau, "Efficient cryptographic protocols based on noisy channels," in Advances in Cryptology (EUROCRYPT '97). New York: Springer, 1997, pp. 306-317. (Pubitemid 127067809)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 306-317
-
-
Crepeau, C.1
-
33
-
-
39049110635
-
On the oblivious transfer capacity of noisy correlations
-
DOI 10.1109/ISIT.2006.261805, 4036292, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
A. Nascimento and A. Winter, "On the oblivious transfer capacity of noisy correlations," in Proc. IEEE Int. Symp. Information Theory (ISIT), Seattle, WA, July 2006, pp. 1871-1875. (Pubitemid 351244423)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 1871-1875
-
-
Nascimento, A.C.A.1
Winter, A.2
-
34
-
-
77950686974
-
On oblivious transfer capacity
-
Nice, France, June
-
R. Ahlswede and I. Csiszár, "On oblivious transfer capacity," in Proc. IEEE Int. Symp. Information Theory (ISIT), Nice, France, June 2007, pp. 2061-2064.
-
(2007)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 2061-2064
-
-
Ahlswede, R.1
Csiszár, I.2
-
35
-
-
70449482066
-
Bootstrapped oblivious transfer and secure two-party function computation
-
Seoul, Korea, June
-
Y. Wang and P. Ishwar, "Bootstrapped oblivious transfer and secure two-party function computation," in Proc. IEEE Int. Symp. Information Theory (ISIT), Seoul, Korea, June 2009, pp. 1303-1307.
-
(2009)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 1303-1307
-
-
Wang, Y.1
Ishwar, P.2
-
36
-
-
0001654702
-
Extensions of Lipschitz mappings into a Hilbert space, Conference in modern analysis and probability
-
W. Johnson and J. Lindenstrauss, "Extensions of Lipschitz mappings into a Hilbert space, Conference in modern analysis and probability," Contemp. Math, vol. 26, pp. 189-206, 1984.
-
(1984)
Contemp. Math
, vol.26
, pp. 189-206
-
-
Johnson, W.1
Lindenstrauss, J.2
-
37
-
-
84870584808
-
Quantized embeddings of scale-invariant image features for mobile augmented reality
-
Banff, AL, Canada 17-19 Sept
-
M. Li, S. Rane, and P. Boufounos, "Quantized embeddings of scale-invariant image features for mobile augmented reality," in Proc. IEEE Int. Workshop Multimedia Signal Processing, Banff, AL, Canada, 17-19 Sept. 2012.
-
(2012)
Proc. IEEE Int. Workshop Multimedia Signal Processing
-
-
Li, M.1
Rane, S.2
Boufounos, P.3
-
39
-
-
84873903150
-
Robust 1-bit compressive sensing via binary stable embeddings of sparse vectors
-
to be published
-
L. Jacques, J. N. Laska, P. T. Boufounos, and R. G. Baraniuk, "Robust 1-bit compressive sensing via binary stable embeddings of sparse vectors," IEEE Trans. Inform. Theory, to be published.
-
IEEE Trans. Inform. Theory
-
-
Jacques, L.1
Laska, J.N.2
Boufounos, P.T.3
Baraniuk, R.G.4
-
40
-
-
37549058056
-
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
-
A. Andoni and P. Indyk, "Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions," Commun. ACM, vol. 51, no. 1, pp. 117-122, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.1
, pp. 117-122
-
-
Andoni, A.1
Indyk, P.2
-
41
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
New York
-
M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," in Proc. 20th Annu. Symp. Computational Geometry, SCG '04, New York, pp. 253-262.
-
Proc. 20th Annu. Symp. Computational Geometry, SCG '04
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
42
-
-
0038754128
-
Lower bounds for embedding edit distance into normed spaces
-
A. Andoni, M. Deza, A. Gupta, P. Indyk, and S. Raskhodnikova, "Lower bounds for embedding edit distance into normed spaces," in Proc. 14th Annu. ACM-SIAM Symp. Discrete Algorithms, 2003, pp. 523-526.
-
(2003)
Proc. 14th Annu. ACM-SIAM Symp. Discrete Algorithms
, pp. 523-526
-
-
Andoni, A.1
Deza, M.2
Gupta, A.3
Indyk, P.4
Raskhodnikova, S.5
-
43
-
-
17744373521
-
Approximating edit distance efficiently
-
Proceedings - 45th Annual IEEE Symposium on Foundations of Computer Sciences, FOCS 2004
-
Z. Bar-Yossef, T. Jayram, R. Krauthgamer, and R. Kumar, "Approximating edit distance efficiently," in Proc. 45th Annu. IEEE Symp. Foundations Computer Science, 2004, pp. 550-559. (Pubitemid 40575316)
-
(2004)
Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
, pp. 550-559
-
-
Bar-Yossef, Z.1
Jayram, T.S.2
Krauthgamer, R.3
Kumar, R.4
-
44
-
-
35348998047
-
Low distortion embeddings for edit distance
-
R. Ostrovsky and Y. Rabani, "Low distortion embeddings for edit distance," J. ACM, vol. 54, no. 5, pp. 23, 2007.
-
(2007)
J. ACM
, vol.54
, Issue.5
, pp. 23
-
-
Ostrovsky, R.1
Rabani, Y.2
-
45
-
-
78349236191
-
Privacy-preserving approximation of, 1 distance for multimedia applications
-
Singapore, July
-
S. Rane, W. Sun, and A. Vetro, "Privacy-preserving approximation of, 1 distance for multimedia applications," in Proc. IEEE Int. Conf. Multimedia and Expo (ICME), Singapore, July 2010, pp. 492-497.
-
(2010)
Proc. IEEE Int. Conf. Multimedia and Expo (ICME)
, pp. 492-497
-
-
Rane, S.1
Sun, W.2
Vetro, A.3
-
47
-
-
70349216521
-
Secure image retrieval through feature protection
-
Taipei, Taiwan, Mar
-
W. Lu, A. Varna, A. Swaminathan, and M. Wu, "Secure image retrieval through feature protection," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), Taipei, Taiwan, Mar. 2009, pp. 1533-1536.
-
(2009)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1533-1536
-
-
Lu, W.1
Varna, A.2
Swaminathan, A.3
Wu, M.4
-
48
-
-
78651068288
-
Security analysis for privacy preserving multimedia retrieval
-
Hong Kong, Sept
-
W. Lu, A. Varna, and M. Wu, "Security analysis for privacy preserving multimedia retrieval," in Proc. IEEE Int. Conf. Image Processing (ICIP), Hong Kong, Sept. 2010, pp. 2093-2096.
-
(2010)
Proc. IEEE Int. Conf. Image Processing (ICIP)
, pp. 2093-2096
-
-
Lu, W.1
Varna, A.2
Wu, M.3
-
49
-
-
78651096334
-
Multimedia forensic hash based on visual words
-
Hong Kong, Sept
-
W. Lu and M. Wu, "Multimedia forensic hash based on visual words," in Proc. IEEE Int. Conf. Image Processing (ICIP), Hong Kong, Sept. 2010, pp. 989-992.
-
(2010)
Proc. IEEE Int. Conf. Image Processing (ICIP)
, pp. 989-992
-
-
Lu, W.1
Wu, M.2
|