Sciweavers

11 search results - page 1 / 3
» Efficient Generalized Selective Private Function Evaluation ...
Sort
View
112
Voted
CISC
2009
Springer
154views Cryptology» more  CISC 2009»
14 years 11 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
112
Voted
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 2 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
149
Voted
ICDAR
2011
IEEE
14 years 21 days ago
Writer Retrieval - Exploration of a Novel Biometric Scenario Using Perceptual Features Derived from Script Orientation
—We propose a novel scenario called “writer retrieval” consisting in the retrieval from a set of documents all those produced by the same writer. The retrieval is based on a ...
Vlad Atanasiu, Laurence Likforman-Sulem, Nicole Vi...
104
Voted
GECCO
2008
Springer
184views Optimization» more  GECCO 2008»
15 years 2 months ago
Evolutionary facial feature selection
With the growing number of acquired physiological and behavioral biometric samples, biometric data sets are experiencing tremendous growth. As database sizes increase, exhaustive ...
Aaron K. Baughman
137
Voted
MOBIHOC
2005
ACM
16 years 21 days ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning