Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: ASIACCS, pp. 48–59 (2010)
Google Scholar
Atallah, M.J., Frikken, K.B., Wang, S.: Private outsourcing of matrix multiplication over closed semi-rings. In: SECRYPT, pp. 136–144 (2012)
Google Scholar
Atallah, M.J., Kerschbaum, F., Du, W.: Secure private sequence comparisons. In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society (WPES 2003), pp. 39–44 (2003)
Google Scholar
Ballard, D., Brown, C.: Computer Vision. Prentice Hall (1982)
Google Scholar
Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264–282. Springer, Heidelberg (2005)
CrossRef
Google Scholar
Hough, P.: Method and means for recognizing complex patterns (1962)
Google Scholar
Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Transactions on Image Processing 21(11), 4593–4607 (2012)
MathSciNet
CrossRef
Google Scholar
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium (2011)
Google Scholar
Leavers, V.F.: Shape Detection in Computer Vision Using the Hough Transform. Springer-Verlag New York, Inc., Secaucus (1992)
CrossRef
Google Scholar
Lindell, Y., Pinkas, B.: A proof of security of yao’s protocol for two-party computation. J. Cryptol. 22(2), 161–188 (2009)
MathSciNet
CrossRef
MATH
Google Scholar
Osadchy, M., Pinkas, B., Jarrous, A., Moskovich, B.: Scifi - a system for secure face identification. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 239–254 (2010)
Google Scholar
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
CrossRef
Google Scholar
Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 229–244. Springer, Heidelberg (2010)
CrossRef
Google Scholar
Williams, P., Sion, R.: Single round access privacy on outsourced storage. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 293–304. ACM, New York (2012)
CrossRef
Google Scholar
Yao, A.C.-C.: How to generate and exchange secrets. In: SFCS 1986, pp. 162–167. IEEE Computer Society, Washington, DC (1986)
Google Scholar