SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0)
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[3] W.L. Woo,et al. Secure Authentication for Face Recognition , 2007, 2007 IEEE Symposium on Computational Intelligence in Image and Signal Processing.
[4] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[5] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Fernando Pérez-González,et al. Secure Direct and Iterative Protocols for Solving Systems of Linear Equations , 2009 .
[8] Adam Ramirez,et al. Parallel Secure Computation Scheme for Biometric Security and Privacy in Standard-Based BioAPI Framework , 2011 .
[9] Ivan Damgård,et al. Oblivious Transfer and Linear Functions , 2006, CRYPTO.
[10] Ivan Damgård,et al. A generalization of Paillier’s public-key system with applications to electronic voting , 2010, International Journal of Information Security.
[11] Huafei Zhu,et al. Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries , 2007, Inscrypt.
[12] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[13] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[14] Somesh Jha,et al. Privacy Preserving Clustering , 2005, ESORICS.
[15] Bon K. Sy,et al. Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[16] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[17] B. K. Sy,et al. Secure Computation for Biometric Data Security—Application to Speaker Verification , 2009, IEEE Systems Journal.
[18] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[19] Pedro F. Miret,et al. Wikipedia , 2008, Monatsschrift für Deutsches Recht.
[20] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[21] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[22] Jeffrey Overbey,et al. ON THE KEYSPACE OF THE HILL CIPHER , 2005, Cryptologia.
[23] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.