Efficient Privacy-Preserving Face Recognition, ICISC, pp.229-244, 2010. ,
DOI : 10.1007/978-3-642-14423-3_16
URL : http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TRUST/PubsPDF/SSW09.pdf
Efficient Multiparty Protocols Using Circuit Randomization, Advances in Cryptology, pp.420-432, 1992. ,
DOI : 10.1007/3-540-46766-1_34
Efficient privacy-preserving biometric identification, NDSS, 2011. ,
Fairplay-secure two-party computation system, USENIX Security, 2004. ,
Sharemind: A Framework for Fast Privacy-Preserving Computations, ESORICS, pp.192-206, 2008. ,
DOI : 10.1007/s001459910003
URL : http://www.math.ut.ee/%7Eswen/publications/articles/bogdanov-laur-willemson-2008.pdf
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23113
Automatic Protocol Selection in Secure Two-Party Computations, ACNS, pp.566-584, 2014. ,
DOI : 10.1007/978-3-319-07536-5_33
URL : http://eprint.iacr.org/2014/200.pdf
Cloud computing: United states businesses will spend $13 billion on it. http://www.forbes.com/sites/tjmccuecloud-computing-united-states- businesses-will-spend-13-billion-on-it, 2014. ,
Privacy-preserving fingercode authentication, Proceedings of the 12th ACM workshop on Multimedia and security, MM&Sec '10, pp.231-240, 2010. ,
DOI : 10.1145/1854229.1854270
Efficient oblivious transfer protocols, In SIAM, pp.448-457, 2001. ,
How to exchange secrets with oblivious transfer, IACR Cryptology ePrint Archive, p.187, 2005. ,
TASTY, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.451-462, 2010. ,
DOI : 10.1145/1866307.1866358
Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.160-164, 1982. ,
DOI : 10.1109/SFCS.1982.38
Privacy-Preserving Face Recognition, PETS, pp.235-253, 2009. ,
DOI : 10.1007/978-3-642-03168-7_14