“Multivariate Lattices for Encrypted Image Processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015. PedrouzoICASSP2015.pdf (348.56 KB)
, “Bootstrap-based Proxy Reencryption for Private Multi-user Computing”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014. TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, “Fully Private Noninteractive Face Verification”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 7, pp. 1101-1114, 2013. TPFJPGTIFS11-FullyPrivateFaceVerif.pdf (745.76 KB)
, “Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 75-86, 2013. smartmeteringspm2013.pdf (547.21 KB)
, “Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 29-41, 2013. cloudspm2013.pdf (965.61 KB)
,