Publications
Export 748 results:
Author [ Title] Type Year Filters: First Letter Of Title is S [Clear All Filters]
2004. Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
2010. Security analysis for privacy preserving search of multimedia. Image Processing (ICIP). :26-29.
2008. Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
2011. Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
2010. Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
2003. A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
2004. Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.
2005. Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. :273-282.
2005. Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.
2002. A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
2003. A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
2012. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
2009. Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
2001. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2007. A Secure DHT via the Pigeonhole Principle. Technical Reports of the Computer Science Department, CS-TR-4884.
2010. Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
1997. A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.