“Multivariate Lattices for Encrypted Image Processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015.
PedrouzoICASSP2015.pdf (348.56 KB)
, 
“Bootstrap-based Proxy Reencryption for Private Multi-user Computing”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, 
“Fully Private Noninteractive Face Verification”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 7, pp. 1101-1114, 2013.
TPFJPGTIFS11-FullyPrivateFaceVerif.pdf (745.76 KB)
, 
“Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 75-86, 2013.
smartmeteringspm2013.pdf (547.21 KB)
, 
“Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 29-41, 2013.
cloudspm2013.pdf (965.61 KB)
, 