Efficient privacy-preserving biometric identification in cloud computing
暂无分享,去创建一个
[1] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[2] Sabih H. Gerez,et al. Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[3] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[4] Anil K. Jain,et al. Decision-Level Fusion in Fingerprint Verification , 2001, Multiple Classifier Systems.
[5] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[6] Helmut Knebl,et al. Introduction to Cryptography - Principles and Applications, Second Edition , 2007, Information Security and Cryptography.
[7] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .
[8] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[9] Kun Liu,et al. An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining , 2006, PKDD.
[10] Cong Wang,et al. Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[11] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[12] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[13] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.
[14] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[15] Arun Ross,et al. A hybrid fingerprint matcher , 2002, Object recognition supported by user interaction for service robots.
[16] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[17] Raymond N. J. Veldhuis,et al. Fingerprint Verification Using Spectral Minutiae Representations , 2009, IEEE Transactions on Information Forensics and Security.
[18] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[19] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[20] Sharath Pankanti,et al. Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..
[21] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.