Security and Privacy in Biometrics
暂无分享,去创建一个
[1] William C. Barker,et al. TECHNOLOGY ADMINISTRATION , 2004 .
[2] Elaine B. Barker,et al. Recommendation for key management: , 2019 .
[3] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[4] Justin Smith. Freedom of information and data protection , 2011 .
[5] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[6] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[7] Javier Herranz,et al. Additively Homomorphic Encryption with d-Operand Multiplications , 2010, IACR Cryptol. ePrint Arch..
[8] Mauro Barni,et al. Gram-Schmidt Orthogonalization on Encrypted Vectors , 2011 .
[9] Doerte K. Rappe. Homomorphic cryptosystems and their applications , 2005, IACR Cryptol. ePrint Arch..
[10] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[11] Irma van der Ploeg,et al. The illegal body: `Eurodac' and the politics of biometric identification , 1999, Ethics and Information Technology.
[12] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Ahmad-Reza Sadeghi,et al. Efficient privacy-preserving classification of ECG signals , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[15] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[16] Roy Coleman. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination , 2003 .
[17] David J. Phillips. Privacy policy and PETs , 2001, New Media Soc..
[18] Zekeriya Erkin,et al. Secure signal processing: Privacy preserving cryptographic protocols for multimedia , 2010 .
[19] Pierluigi Failla. Heuristic Search in Encrypted Graphs , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[20] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[21] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[22] Ahmad-Reza Sadeghi,et al. Practical Secure Evaluation of Semi-Private Functions , 2009, IACR Cryptol. ePrint Arch..
[23] Vincent Leith,et al. The Rijndael Block Cipher , 2010 .
[24] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[25] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[26] Shantanu Rane,et al. Privacy preserving string comparisons based on Levenshtein distance , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[27] Z. Zai-feng. A Novel Image Compression Coding Algorithm Based on Pulse-Coupled Neural Network and Gram-Schmidt Orthogonal Base , 2006 .
[28] E. J. Koops,et al. D3.16: Biometrics: PET or PIT? , 2009 .
[29] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[30] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[31] Mauro Barni,et al. Privacy preserving evaluation of signal quality with application to ECG analysis , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[32] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[33] Gene H. Golub,et al. Matrix computations , 1983 .
[34] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[35] Mauro Barni,et al. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.
[36] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[37] Chris Conley,et al. Ethical Implications of Emerging Technologies: A Survey , 2007 .
[38] Ahmad-Reza Sadeghi,et al. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.
[39] Yehuda Lindell,et al. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.
[40] A.C.J. Sprokkereef,et al. The Use of Privacy Enhancing Aspects of Biometrics : Biometrics as a PET (privacy enhancing technology) in the Dutch private and semi-public domain , 2009 .
[41] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[42] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[43] Annemarie Sprokkereef,et al. Data Protection and the Use of Biometric Data in the EU , 2007, FIDIS.
[44] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[45] Stefan Katzenbeisser,et al. A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[46] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[47] Kuldip K. Paliwal,et al. Fast principal component analysis using fixed-point algorithm , 2007, Pattern Recognit. Lett..
[48] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[49] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[50] Jeroen Doumen,et al. Using Secret Sharing for Searching in Encrypted Data , 2004, Secure Data Management.
[51] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[52] A.C.J. Sprokkereef,et al. ETHICAL PRACTICE IN THE USE OF BIOMETRIC IDENTIFIERS WITHIN THE EU , 2007 .
[53] Claudio Orlandi,et al. A New Approach to Practical Active-Secure Two-Party Computation , 2012, IACR Cryptol. ePrint Arch..
[54] Ivan Damgård,et al. Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.
[55] Sophocles J. Orfanidis,et al. GramSchmidt Neural Nets , 1990, Neural Computation.
[56] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[57] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[58] Craig Gentry,et al. A Simple BGN-Type Cryptosystem from LWE , 2010, EUROCRYPT.
[59] Vincenzo Piuri,et al. A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[60] E. Kushilevitz. Foundations of Cryptography Foundations of Cryptography , 2014 .
[61] C. Chui,et al. Wavelets on a Bounded Interval , 1992 .
[62] Vitaly Shmatikov,et al. Privacy-preserving remote diagnostics , 2007, CCS '07.
[63] Ahmad-Reza Sadeghi,et al. Secure Evaluation of Private Linear Branching Programs with Medical Applications , 2009, ESORICS.
[64] Ahmad-Reza Sadeghi,et al. Modular Design of Efficient Secure Function Evaluation Protocols , 2010 .
[65] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[66] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[67] P. Thompson. Digital Identity , 2003 .
[68] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[69] Nils J. Nilsson,et al. A Formal Basis for the Heuristic Determination of Minimum Cost Paths , 1968, IEEE Trans. Syst. Sci. Cybern..
[70] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[71] Ueli Maurer,et al. Unbreakable Keys from Random Noise; ; ; Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting , 2007 .
[72] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[73] Mauro Barni,et al. Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.