Sciweavers

139 search results - page 12 / 28
» Cryptographic Randomized Response Techniques
Sort
View
CVPR
2004
IEEE
14 years 12 months ago
Random Sampling LDA for Face Recognition
Linear Discriminant Analysis (LDA) is a popular feature extraction technique for face recognition. However, It often suffers from the small sample size problem when dealing with t...
Xiaogang Wang, Xiaoou Tang
ICICS
2009
Springer
14 years 4 months ago
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
Abstract. We propose an efficient technique for the detection of errors in cryptographic circuits introduced by strong adversaries. Previously a number of linear and nonlinear err...
Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Jos...
CCS
2001
ACM
14 years 2 months ago
New Iterative Geometric Methods for Robust Perceptual Image Hashing
We propose a novel and robust hashing paradigm that uses iterative geometric techniques and relies on observations that main geometric features within an image would approximately ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
EUROCRYPT
2010
Springer
13 years 10 months ago
On the Impossibility of Three-Move Blind Signature Schemes
We investigate the possibility to prove security of the well-known blind signature schemes by Chaum, and by Pointcheval and Stern in the standard model, i.e., without random oracle...
Marc Fischlin, Dominique Schröder
ICEB
2004
175views Business» more  ICEB 2004»
13 years 11 months ago
Privacy-Preserving Data Mining in Electronic Surveys
Electronic surveys are an important resource in data mining. However, how to protect respondents' data privacy during the survey is a challenge to the security and privacy co...
Justin Z. Zhan, Stan Matwin