SLIDE: An Efficient Secure Linguistic Steganography Detection Protocol
暂无分享,去创建一个
Jie Zhang | Sheng Wang | Chao Tang | Linghao Zhang | Wei Gan | Huihui Liang
[1] Jian Wang,et al. Efficient Encrypted Data Comparison Through a Hybrid Method , 2017, J. Inf. Sci. Eng..
[2] Jie Wu,et al. Friendship-based location privacy in Mobile Social Networks , 2011, Int. J. Secur. Networks.
[3] Chris Clifton,et al. Efficient privacy-preserving similar document detection , 2010, The VLDB Journal.
[4] Yang Yi-xian. Research on the detecting algorithm of text document information hiding , 2004 .
[5] Mauro Barni,et al. A privacy-preserving protocol for neural-network-based computation , 2006, MM&Sec '06.
[6] Liusheng Huang,et al. Relation of PPAtMP and scalar product protocol and their applications , 2010, The IEEE symposium on Computers and Communications.
[7] Tsuyoshi Takagi,et al. Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..
[8] Chris Clifton,et al. Similar Document Detection with Limited Information Disclosure , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[9] Aniello Castiglione,et al. Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner , 2017, Comput. Secur..
[10] Jian Wang,et al. Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud , 2017, Int. J. Found. Comput. Sci..
[11] Yang Wei,et al. Text Information Hiding Detecting Algorithm Based on Statistics , 2008 .
[12] Edward J. Delp,et al. Attacks on lexical natural language steganography systems , 2006, Electronic Imaging.
[13] Jie Wu,et al. Privacy-preserved data publishing of evolving online social networks , 2016 .
[14] Vitaly Shmatikov,et al. Privacy-preserving remote diagnostics , 2007, CCS '07.
[15] Liusheng Huang,et al. Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words , 2008, Information Hiding.
[16] Lu Zhou,et al. Efficiently and securely harnessing cloud to solve linear regression and other matrix operations , 2018, Future Gener. Comput. Syst..
[17] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[18] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[19] Wenzhong Li,et al. Navigation-driven handoff minimization in wireless networks , 2016, J. Netw. Comput. Appl..