暂无分享,去创建一个
[1] Thijs Veugen,et al. Improving the DGK comparison protocol , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[2] Gwénolé Quellec,et al. An end to end secure CBIR over encrypted medical database , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[3] Gwénolé Quellec,et al. Content-based image retrieval in homomorphic encryption domain , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[4] Luís A. Bastião Silva,et al. Sharing medical imaging over the cloud services , 2012 .
[5] Abdelkarim Erradi,et al. Paillier's encryption: Implementation and cloud applications , 2015, 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR).
[6] Yu Bai,et al. Surf feature extraction in encrypted domain , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).
[7] Kui Ren,et al. Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[8] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[9] Thomas Schneider,et al. Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT" , 2014, IH&MMSec '14.
[10] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[11] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[12] Peijia Zheng,et al. Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.
[13] Cong Wang,et al. Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.
[14] Dan POPESCU,et al. HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING , 2015 .
[15] Cong Wang,et al. SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[16] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[17] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[18] Gwénolé Quellec,et al. Wavelet optimization for content-based image retrieval in medical databases , 2010, Medical Image Anal..
[19] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[20] Kui Ren,et al. Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[21] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[22] Wei Pan,et al. Privacy protection and security in eHealth cloud platform for medical image sharing , 2016, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).
[23] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[24] William Gasarch. A Survey on Private Information Retrieval , 2004 .
[25] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[26] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.