搜索结果: 151-165 共查到“preserving”相关记录331条 . 查询时间(0.046 秒)
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Content-Based Image Retrieval (CBIR) Searchable Symmetric Encryption (SSE) Encrypted Data Processing
2015/12/24
Storage requirements for visual data have been increasing in recent years, following the emergence of many new
highly interactive multimedia services and applications for both personal and corporate ...
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Group signatures standard model simple assumptions
2015/12/24
Group signatures are a central cryptographic primitive which allows users to sign messages
while hiding their identity within a crowd of group members. In the standard model (without the random
orac...
Efficient Fully Structure-Preserving Signatures for Large Messages
Digital signatures pairing-based cryptography full structure-preservation
2015/12/23
We construct both randomizable and strongly existentially
unforgeable structure-preserving signatures for messages consisting of
many group elements. To sign a message consisting of N = mn group ele...
Privacy-preserving Attribute Based Searchable Encryption
Attribute Based Encryption Anonymity Searchable Encryption
2015/12/23
Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive that can be used for cryptographically enforced access control in untrusted storage. Storing data on untrusted storag...
PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
implementation applications
2015/12/22
Cloud providers are realizing the outsourced database model in the form of database-as-a-service offerings. However, security in terms of data privacy remains an obstacle because data storage and proc...
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
Physically Unclonable Function authentication privacy-preserving protocol
2015/12/22
We demonstrate a prototype implementation of a provably
secure protocol that supports privacy-preserving mutual authentication
between a server and a constrained device. Our proposed protocol is
ba...
Short Structure-Preserving Signatures
Structure-Preserving Digital Signatures Bilinear Groups
2015/12/22
We construct a new structure-preserving signature scheme
in the efficient Type-III asymmetric bilinear group setting with signatures
shorter than all existing schemes. Our signatures consist of 3 gr...
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
Bitcoin proof of solvency
2015/12/22
Bitcoin exchanges function like banks, securely holding their customers’ bitcoins on their behalf.
Several exchanges have suffered catastrophic losses with customers permanently losing their savings....
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential
Smart grid Privacy protection Linkable anonymous credential
2015/12/21
To accomplish effective privacy protection in smart grid systems, various
approaches were proposed combining information security technology with the smart grid’s
new features. Diao et al. proposed ...
POPE: Partial Order-Preserving Encoding
order-preserving encoding order-preserving encryption partial order-preserving encoding
2015/12/21
Recently there has been much interest in performing database queries over encrypted data to enable
functionality while protecting sensitive data. One particularly efficient mechanism for executing su...
Privacy-preserving Friendship-based Recommender Systems
recommender system privacy homomorphic encryption
2015/12/21
Today, recommender systems are playing an
indispensable role in our daily life. However, nothing is for
free – such systems have also upset the society with severe
privacy concerns. In this paper, ...
Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation
privacy statistics secure multi-party computation
2015/12/18
We describe the use of secure multi-party computation for
performing a large-scale privacy-preserving statistical study on real government
data. In 2015, statisticians in Estonia conducted a big dat...
Vectorization, Edge Preserving Smoothing and Dimensioning of Profiles in Laser Scanner Point Clouds
Laser scanning Edge preserving smoothing Profile
2015/12/16
The 3D geometry of an object can be captured very efficiently using a terrestrial laser scanner. By modelling and visualisation of
these 3D data, it is possible to obtain vectorized geometric informa...
Topology-Preserving Network Snakes
Computer Vision Active Contour Models Optimization Segmentation Networks Topology Roads
2015/12/4
Active contour models have been part of extensive research since their introduction in the late eighties, because their concept of coupling the image data with shape control is a powerful method to de...
Preserving Ground Plan and Facade Lines for 3D Building Generalization
3D GIS 3D City Models Visualization Buildings Generalization Adjustment
2015/12/2
As 3D city models are becoming available and attractive for consumer purposes in personal navigation systems or visualization applications, the hardware used to visualize these models changes from spe...