Exportar 36 resultados:
Autor Título Tipo [ Año
Filtros: Autor es Juan Ramón Troncoso-Pastoriza [Elimina todos los filtros]
«Image denoising in the encrypted domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016.
PTP16_WIFS16.pdf (527.76 KB)
, 
«Number Theoretic Transforms for Secure Signal Processing», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 5, pp. 1125-1140, 2017.
PTP17_TIFS.pdf (651.54 KB)
, 
«Secure Genomic Susceptibility Testing based on Lattice Encryption», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017.
TPP17_ICASSP17.pdf (403.53 KB)
, 
«Camera Attribution Forensic Analyzer in the Encrypted Domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018.
PMTP18_WIFS18.pdf (655.48 KB)
, 
«Efficient PRNU Matching in the Encrypted Domain», in XoveTIC, A Coruña, Spain, 2019.
PMTP19_XoveTIC19.pdf (517.32 KB)
, 
«Revisiting Multivariate Lattices for Encrypted Signal Processing», in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019.
PTP19_IHMMSec19.pdf (1.67 MB)
, 
«Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE», in International Conference on Security and Cryptography for Networks (SCN), 2020.
BEPST20-SCN20.pdf (457.81 KB)
, 
«Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation», in IEEE International Workshop on Information Forensics and Security (WIFS), 2020.
PTGGP20-WIFS20.pdf (645.17 KB)
, 
«A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"», in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021.
PMTP21-JNIC21.pdf (259.84 KB)
, 
«Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography», Mathematics, vol. 9, n.º 8, 2021.
PTGGP21.pdf (1.04 MB)
, 
«Efficient protocols for oblivious linear function evaluation from ring-LWE», Journal of Computer Security, vol. 30, n.º 1, p. 40, 2022.
,