Raw Data Raw Feature Data Discrete Feature Vector Reference Storage Behavioral or Physiological Trait Raw Data Raw Feature Data Discrete Feature Vector Data Acquisition Preprocessing Feature Extraction Store Feature Vector Authentication
暂无分享,去创建一个
[1] Martin Schäler,et al. Toward variability management to tailor high dimensional index implementations , 2014, 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS).
[2] Gunter Saake,et al. QuEval: Beyond high-dimensional indexing a la carte , 2013, Proc. VLDB Endow..
[3] Stefan Katzenbeisser,et al. Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain , 2013, Security and Privacy in Biometrics.
[4] Gunter Saake,et al. Privacy-Aware Multidimensional Indexing , 2013, BTW.
[5] Martin Schäler,et al. Secure Deletion: Towards Tailor-Made Privacy in Database Systems , 2013, BTW Workshops.
[6] Gunter Saake,et al. Challenges in Finding an Appropriate Multi-Dimensional Index Structure with Respect to Specific Use Cases , 2012, Grundlagen von Datenbanken.
[7] Carsten Binnig,et al. Query Processing on Encrypted Data in the Cloud by , 2011 .
[8] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[9] K. Srinathan,et al. Efficient Biometric Verification in Encrypted Domain , 2009, ICB.
[10] Sheng Zhong,et al. Two methods for privacy preserving data mining with malicious participants , 2007, Inf. Sci..
[11] Divyakant Agrawal,et al. Privacy preserving decision tree learning over multiple parties , 2007, Data Knowl. Eng..
[12] Gerome Miklau,et al. Threats to privacy in the forensic analysis of database systems , 2007, SIGMOD '07.
[13] Jana Dittmann,et al. Taxonomy for Computer Security Incidents , 2007 .
[14] Yücel Saygin,et al. Privacy Preserving Clustering on Horizontally Partitioned Data , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[15] Claus Vielhauer. Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.
[16] Arun Ross,et al. Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.
[17] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[18] Rudolf Bayer,et al. Organization and maintenance of large ordered indexes , 1972, Acta Informatica.
[19] A. Juels,et al. A Fuzzy Vault Scheme , 2002, Proceedings IEEE International Symposium on Information Theory,.
[20] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[21] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[22] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[23] Hans-Peter Kriegel,et al. The pyramid-technique: towards breaking the curse of dimensionality , 1998, SIGMOD '98.
[24] Douglas Comer,et al. Ubiquitous B-Tree , 1979, CSUR.