Secure and Private Outsourcing of Shape-Based Feature Extraction
暂无分享,去创建一个
[1] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[2] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[3] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[4] Mikhail J. Atallah,et al. Private Outsourcing of Matrix Multiplication over Closed Semi-rings , 2012, SECRYPT.
[5] Peter Williams,et al. Single round access privacy on outsourced storage , 2012, CCS '12.
[6] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[7] Dong Hoon Lee,et al. Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers , 2010, ICISC.
[8] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[9] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[10] V. F. F. Leavers. Shape Detection in Computer Vision Using the Hough Transform , 2011 .
[11] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[12] Abhi Shelat,et al. Efficient Secure Computation with Garbled Circuits , 2011, ICISS.
[13] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[14] Wenliang Du,et al. Secure and private sequence comparisons , 2003, WPES '03.
[15] Dana H. Ballard,et al. Computer Vision , 1982 .
[16] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[17] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.