Author:
Xiang Can,Tang Chunming,Cai Yunlu,Xu Qiuxia
Funder
the NationalNatural Science Foundation of China
the National Research Foundation for the Doctoral Program of Higher Education of China
High Level Talents Project of Guangdong, Guangdong Provincial Natural Science Foundation
the Project of Department of Education of Guangdong Province
the Natural Science Foundation of Bureau of Education of Guangzhou
basic research major projects of Department of Education of Guangdong Province
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference39 articles.
1. Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing systems (NIPS’06), pp 57–64
2. Bhattacharjee D, Basu DK, Nasipuri M, Kundu M (2010) Human face recognition using fuzzy multilayer perceptron. Soft Comput 14(6):559–570
3. Blanton M, Aliasgari M (2012) Secure outsourced computation of Iris matching. J Comput Security 20(2):259–305
4. Boyen X (2004) Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM conference on Computer and communications security, pp 82–91
5. Castiglione A, Pizzolante R, De-Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3D healthcare data. Futur Gener Comput Syst 1(43):120–134
Cited by
51 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献