Exportar 36 resultados:
Autor Título [ Tipo] Año Filtros: Autor es Juan Ramón Troncoso-Pastoriza [Elimina todos los filtros]
«Bootstrap-based Proxy Reencryption for Private Multi-user Computing», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014. TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, «Camera Attribution Forensic Analyzer in the Encrypted Domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018. PMTP18_WIFS18.pdf (655.48 KB)
, «Co-creating Security-and-Privacy-by-Design Systems», in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, «CryptoDSPs for Cloud Privacy», in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, «Dynamic Privacy-Preserving Genomic Susceptibility Testing», in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50. IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, «Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Efficient PRNU Matching in the Encrypted Domain», in XoveTIC, A Coruña, Spain, 2019. PMTP19_XoveTIC19.pdf (517.32 KB)
, «Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE», in International Conference on Security and Cryptography for Networks (SCN), 2020. BEPST20-SCN20.pdf (457.81 KB)
, «Efficient Protocols for Secure Adaptive Filtering», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863. secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, «Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience», in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, «Fully Homomorphic Faces», in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012. cryptofaces.pdf (213.56 KB)
, «Image denoising in the encrypted domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016. PTP16_WIFS16.pdf (527.76 KB)
, «Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation», in IEEE International Workshop on Information Forensics and Security (WIFS), 2020. PTGGP20-WIFS20.pdf (645.17 KB)
, «Multivariate Lattices for Encrypted Image Processing», in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015. PedrouzoICASSP2015.pdf (348.56 KB)
, «A new model for Gabor Coefficients' Magnitude in Face Recognition», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, USA, 2010.
, «Privacy Preserving Error Resilient DNA Searching through Oblivious Automata», in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
, «A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"», in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021. PMTP21-JNIC21.pdf (259.84 KB)
, «Revisiting Multivariate Lattices for Encrypted Signal Processing», in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019. PTP19_IHMMSec19.pdf (1.67 MB)
, «Secure and Private Medical Clouds using Encrypted Processing», in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, «Secure Direct and Iterative Protocols for Solving Systems of Linear Equations», in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB)
, «Secure Genomic Susceptibility Testing based on Lattice Encryption», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017. TPP17_ICASSP17.pdf (403.53 KB)
, «A Secure Multidimensional Point Inclusion Protocol», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, «Skewed Log-Stable model for natural images pixel block-variance», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB)
, «Zero-Knowledge watermark detector robust to sensitivity attacks», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
,