Efficient anonymous biometric matching in privacy-aware environments
暂无分享,去创建一个
[1] Yücel Saygin,et al. Distributed privacy preserving k-means clustering with additive secret sharing , 2008, PAIS '08.
[2] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[3] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[4] Deirdre K. Mulligan,et al. Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[5] Sharath Pankanti,et al. On the similarity of identical twin fingerprints , 2002, Pattern Recognit..
[6] Barry Steinhardt,et al. Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society , 2014 .
[7] Sen-Ching S. Cheung,et al. Video Data Hiding for Managing Privacy Information in Surveillance Systems , 2009, EURASIP J. Inf. Secur..
[8] K. Nakayama,et al. Human face recognition ability is specific and highly heritable , 2010, Proceedings of the National Academy of Sciences.
[9] A. Sadeghi,et al. How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently , 2009 .
[10] Chi-Jen Lu,et al. Oblivious polynomial evaluation and oblivious neural learning , 2001, Theor. Comput. Sci..
[11] Eike Kiltz,et al. Secure Linear Algebra Using Linearly Recurrent Sequences , 2007, Complexity of Boolean Functions.
[12] Nalini Venkatasubramanian,et al. Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.
[13] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[14] Miao Pan,et al. Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.
[15] Joe Kilian,et al. One-Round Secure Computation and Secure Autonomous Mobile Agents , 2000, ICALP.
[16] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[17] Helger Lipmaa,et al. Verifiable Homomorphic Oblivious Transfer and Private Equality Test , 2003, ASIACRYPT.
[18] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[19] Rong Yan,et al. Tools for Protecting the Privacy of Specific Individuals in Video , 2007, EURASIP J. Adv. Signal Process..
[20] Farzin Deravi,et al. Feasibility of generating biometric encryption keys , 2005 .
[21] Piotr Indyk,et al. Similarity Search in High Dimensions via Hashing , 1999, VLDB.
[22] Mauro Barni,et al. Oblivious Neural Network Computing via Homomorphic Encryption , 2007, EURASIP J. Inf. Secur..
[23] Mohan Trivedi,et al. The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks , 2004, VSSN '04.
[24] Libor Masek,et al. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .
[25] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[26] Rebecca N. Wright,et al. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.
[27] Adi Shamir,et al. How to share a secret , 1979, CACM.
[28] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[29] Ying Luo,et al. Anonymous subject identification in privacy-aware video surveillance , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[30] K. Plataniotis,et al. Privacy Protected Surveillance Using Secure Visual Object Coding , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[31] John Daugman. How iris recognition works , 2004 .
[32] Ju Shen,et al. Extrinsic calibration for wide-baseline RGB-D camera network , 2014, 2014 IEEE 16th International Workshop on Multimedia Signal Processing (MMSP).
[33] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[34] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[35] Gene Tsudik,et al. ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2007, IEEE Transactions on Mobile Computing.
[36] Ying Luo,et al. Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.
[37] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[38] Elaine B. Barker,et al. Recommendation for key management: , 2019 .
[39] Jian Zhao,et al. Multi-Camera Surveillance with Visual Tagging and Generic Camera Placement , 2007, 2007 First ACM/IEEE International Conference on Distributed Smart Cameras.
[40] Benny Pinkas,et al. Secure computation of the kth-ranked element , 2004 .
[41] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[42] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[43] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[44] Mauro Barni,et al. Privacy preserving evaluation of signal quality with application to ECG analysis , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[45] Ann Cavoukian. Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .
[46] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[47] Aviel D. Rubin,et al. Security considerations for remote electronic voting , 2002, CACM.
[48] Noboru Babaguchi,et al. Privacy Preserving: Hiding a Face in a Face , 2007, ACCV.
[49] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[50] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[51] Benny Pinkas,et al. Secure Computation of the k th-Ranked Element , 2004, EUROCRYPT.
[52] Dimitra I. Kaklamani,et al. A middleware architecture for privacy protection , 2007, Comput. Networks.
[53] Jian Zhao,et al. Anonymous Biometric Access Control , 2009, EURASIP J. Inf. Secur..
[54] Jian Zhao,et al. Efficient Object-Based Video Inpainting , 2006, 2006 International Conference on Image Processing.
[55] William Gasarch. A Survey on Private Information Retrieval , 2004 .
[56] Moni Naor,et al. Oblivious Polynomial Evaluation , 2006, SIAM J. Comput..
[57] Moni Naor,et al. Communication Complexity and Secure Function Evaluation , 2001, Electron. Colloquium Comput. Complex..
[58] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[59] Octavian Catrina,et al. Improved Primitives for Secure Multiparty Integer Computation , 2010, SCN.
[60] Christos Faloutsos,et al. FastMap: a fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets , 1995, SIGMOD '95.
[61] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[62] Jian Zhao,et al. Protecting and Managing Privacy Information in Video Surveillance Systems , 2009, Protecting Privacy in Video Surveillance.
[63] Andreas Uhl,et al. Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.
[64] Yehuda Lindell,et al. A Proof of Yao's Protocol for Secure Two-Party Computation , 2004, Electron. Colloquium Comput. Complex..
[65] Ivan Damgård,et al. Secure Distributed Linear Algebra in a Constant Number of Rounds , 2001, CRYPTO.
[66] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[67] Ivan Damgård,et al. Homomorphic encryption and secure comparison , 2008, Int. J. Appl. Cryptogr..
[68] Pim Tuyls,et al. Efficient Binary Conversion for Paillier Encrypted Values , 2006, EUROCRYPT.
[69] Jaideep Vaidya,et al. Knowledge and Information Systems , 2007 .
[70] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[71] Ying Luo,et al. Anonymous Biometric Access Control based on homomorphic encryption , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[72] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[73] Sudeep Sarkar,et al. Privacy & Security Issues Related to Match Scores , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[74] Stefan Katzenbeisser,et al. Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..
[75] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[76] Tsuhan Chen,et al. Investigating useful and distinguishing features around the eyelash region , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.
[77] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[78] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[79] Ali Miri,et al. Privacy preserving ID3 using Gini Index over horizontally partitioned data , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[80] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[81] Ying Luo,et al. Privacy information management for video surveillance , 2013, Defense, Security, and Sensing.
[82] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[83] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[84] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[85] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[86] David Zhang,et al. A study of identical twins' palmprints for personal verification , 2006, Pattern Recognit..
[87] Mauro Barni,et al. Discrete cosine transform of encrypted images , 2008, 2008 15th IEEE International Conference on Image Processing.
[88] Sen-Ching S. Cheung,et al. Secure Multiparty Computation between Distrusted Networks Terminals , 2007, EURASIP J. Inf. Secur..
[89] Mauro Barni,et al. Division between encrypted integers by means of Garbled Circuits , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[90] Jian Zhao,et al. Optimal Camera Network Configurations for Visual Tagging , 2008, IEEE Journal of Selected Topics in Signal Processing.
[91] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[92] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[93] Ying Luo,et al. Efficient multi-party computation with collusion-deterred secret sharing , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[94] Michael C. Hout,et al. Multidimensional Scaling , 2003, Encyclopedic Dictionary of Archaeology.
[95] J. Bourgain. On lipschitz embedding of finite metric spaces in Hilbert space , 1985 .
[96] T.E. Boult,et al. PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).
[97] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[98] H. Hotelling. Analysis of a complex of statistical variables into principal components. , 1933 .
[99] Mauro Barni,et al. An efficient protocol for private iris-code matching by means of garbled circuits , 2012, 2012 19th IEEE International Conference on Image Processing.
[100] Marc Fischlin,et al. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires , 2001, CT-RSA.
[101] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[102] Touradj Ebrahimi,et al. Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[103] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[104] Kenneth H. Rosen. Elementary Number Theory , 2004 .
[105] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[106] Rebecca N. Wright,et al. A New Privacy-Preserving Distributed k-Clustering Algorithm , 2006, SDM.