Exportar 36 resultados:
Autor Título Tipo [ Año
Filtros: Autor es Juan Ramón Troncoso-Pastoriza [Elimina todos los filtros]
«Efficient protocols for oblivious linear function evaluation from ring-LWE», Journal of Computer Security, vol. 30, n.º 1, p. 40, 2022.
, «A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"», in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021.
PMTP21-JNIC21.pdf (259.84 KB)
, 
«Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography», Mathematics, vol. 9, n.º 8, 2021.
PTGGP21.pdf (1.04 MB)
, 
«Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE», in International Conference on Security and Cryptography for Networks (SCN), 2020.
BEPST20-SCN20.pdf (457.81 KB)
, 
«Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation», in IEEE International Workshop on Information Forensics and Security (WIFS), 2020.
PTGGP20-WIFS20.pdf (645.17 KB)
, 
«Efficient PRNU Matching in the Encrypted Domain», in XoveTIC, A Coruña, Spain, 2019.
PMTP19_XoveTIC19.pdf (517.32 KB)
, 
«Revisiting Multivariate Lattices for Encrypted Signal Processing», in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019.
PTP19_IHMMSec19.pdf (1.67 MB)
, 
«Camera Attribution Forensic Analyzer in the Encrypted Domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018.
PMTP18_WIFS18.pdf (655.48 KB)
, 
«Number Theoretic Transforms for Secure Signal Processing», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 5, pp. 1125-1140, 2017.
PTP17_TIFS.pdf (651.54 KB)
, 
«Secure Genomic Susceptibility Testing based on Lattice Encryption», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017.
TPP17_ICASSP17.pdf (403.53 KB)
, 
«Co-creating Security-and-Privacy-by-Design Systems», in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, «Dynamic Privacy-Preserving Genomic Susceptibility Testing», in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50.
IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, 
«Image denoising in the encrypted domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016.
PTP16_WIFS16.pdf (527.76 KB)
, 
«Multivariate Lattices for Encrypted Image Processing», in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015.
PedrouzoICASSP2015.pdf (348.56 KB)
, 
«Bootstrap-based Proxy Reencryption for Private Multi-user Computing», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, 
«Technical Report UV/TSC/APU/02102014: Multivariate Ring Learning with Errors», University of Vigo, 2014.
TRMLWE2014.pdf (349.18 KB)
, 
«Fully Private Noninteractive Face Verification», IEEE Transactions on Information Forensics and Security, vol. 8, n.º 7, pp. 1101-1114, 2013.
TPFJPGTIFS11-FullyPrivateFaceVerif.pdf (745.76 KB)
, 
«Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview», IEEE Signal Processing Magazine, vol. 30, n.º 2, pp. 75-86, 2013.
smartmeteringspm2013.pdf (547.21 KB)
, 
«Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing», IEEE Signal Processing Magazine, vol. 30, n.º 2, pp. 29-41, 2013.
cloudspm2013.pdf (965.61 KB)
, 
«Encrypted Domain Processing for Signal Processing Applications», University of Vigo, Vigo, 2012.
jr_troncoso_thesis.pdf (4.44 MB)
, 
«Fully Homomorphic Faces», in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012.
cryptofaces.pdf (213.56 KB)
, 
«Efficient Protocols for Secure Adaptive Filtering», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863.
secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, 
«Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience», in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, «Secure Adaptive Filtering», IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011.
TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, 
«CryptoDSPs for Cloud Privacy», in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
,