Privacy-preserving face recognition with outsourced computation
暂无分享,去创建一个
Chunming Tang | Can Xiang | Yunlu Cai | Qiuxia Xu | Can Xiang | Chunming Tang | Yunlu Cai | Qiuxia Xu
[1] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[2] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[3] Ivan Damgård,et al. Homomorphic encryption and secure comparison , 2008, Int. J. Appl. Cryptogr..
[4] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[5] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[6] Yehuda Lindell,et al. A Proof of Yao's Protocol for Secure Two-Party Computation , 2004, Electron. Colloquium Comput. Complex..
[7] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[8] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[9] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..
[10] Ivan Damgård,et al. Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.
[11] Jianfeng Ma,et al. Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption , 2013, ESORICS.
[12] Shai Avidan,et al. Efficient Methods for Privacy Preserving Face Detection , 2006, NIPS.
[13] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[14] Yevgeniy Dodis,et al. Correcting errors without leaking partial information , 2005, STOC '05.
[15] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[16] Tom A. M. Kevenaar. Protection of Biometric Information , 2007 .
[17] Giles Hogben,et al. Privacy Features: Privacy features of European eID card specifications , 2008 .
[18] Carlos D. Castillo,et al. Fuzzy Vault , 2009, Encyclopedia of Biometrics.
[19] Ee-Chien Chang,et al. Small Secure Sketch for Point-Set Difference , 2005, IACR Cryptol. ePrint Arch..
[20] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[21] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[22] Christian Esposito,et al. Interconnecting Federated Clouds by Using Publish-Subscribe Service , 2013, Cluster Computing.
[23] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[24] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[25] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[26] Alfredo De Santis,et al. Cloud-based adaptive compression and secure management services for 3D healthcare data , 2015, Future Gener. Comput. Syst..
[27] Touradj Ebrahimi,et al. Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[28] Ivan Damgård,et al. A correction to 'efficient and secure comparison for on-line auctions' , 2009, Int. J. Appl. Cryptogr..
[29] Evgeny Verbitskiy,et al. RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION , 2007 .
[30] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[31] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[32] Noboru Babaguchi,et al. Privacy protecting visual processing for secure video surveillance , 2008, 2008 15th IEEE International Conference on Image Processing.
[33] V. Kshirsagar,et al. Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.
[34] Shaogang Gong,et al. Audio- and Video-based Biometric Person Authentication , 1997, Lecture Notes in Computer Science.
[35] Hongwei Ye,et al. Dual-kernel based 2D linear discriminant analysis for face recognition , 2015, J. Ambient Intell. Humaniz. Comput..
[36] Christian Esposito,et al. Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.
[37] Sharath Pankanti,et al. Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.
[38] Ee-Chien Chang,et al. Hiding Secret Points Amidst Chaff , 2006, EUROCRYPT.
[39] Mita Nasipuri,et al. Human face recognition using fuzzy multilayer perceptron , 2010, Soft Comput..
[40] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[41] Chunming Tang,et al. Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions , 2014, IACR Cryptol. ePrint Arch..
[42] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[43] Zhen Liu,et al. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage , 2014, ESORICS.
[44] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[45] Marina Blanton,et al. Secure outsourced computation of iris matching , 2012, J. Comput. Secur..
[46] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[47] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..