One-Way Private Media Search on Public Databases: The Role of Signal Processing
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[2] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[3] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[4] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[5] Seth Lloyd,et al. Quantum Private Queries: Security Analysis , 2008, IEEE Transactions on Information Theory.
[6] Chuohao Yeo,et al. Rate-efficient visual correspondences using random projections , 2008, 2008 15th IEEE International Conference on Image Processing.
[7] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[8] Ton Kalker,et al. A Highly Robust Audio Fingerprinting System , 2002, ISMIR.
[9] Elisa Bertino,et al. Private Searching on Streaming Data Based on Keyword Frequency , 2014, IEEE Transactions on Dependable and Secure Computing.
[10] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[11] Yuval Ishai,et al. Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing , 2000, CRYPTO.
[12] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[13] David P. Woodruff,et al. A geometric approach to information-theoretic private information retrieval , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).
[14] Gerald Friedland,et al. Cybercasing the Joint: On the Privacy Implications of Geo-Tagging , 2010, HotSec.
[15] Ahmad-Reza Sadeghi,et al. Embedded SFE: Offloading Server and Network Using Hardware Tokens , 2010, Financial Cryptography.
[16] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[17] Radu Sion,et al. On the Computational Practicality of Private Information Retrieval , 2006 .
[18] Petros Boufounos,et al. Secure binary embeddings for privacy preserving nearest neighbors , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[19] Lei Wu,et al. Compact projection: Simple and efficient near neighbor search with practical memory requirements , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[20] K. Srinathan,et al. Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[21] Ian Goldberg,et al. Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.
[22] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[23] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[24] Paris Smaragdis,et al. A Framework for Secure Speech Recognition , 2007, IEEE Trans. Speech Audio Process..
[25] Bhiksha Raj,et al. Privacy-preserving speaker verification as password matching , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[26] Vincenzo Piuri,et al. A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[27] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[28] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.
[29] Ahmad-Reza Sadeghi,et al. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.