搜索结果: 1-6 共查到“知识库 军事学 Face”相关记录6条 . 查询时间(0.192 秒)
Two-Face: New Public Key Multivariate Schemes
Multivariate Cryptography HFE Generalization new multivariate quadratic permutations
2017/12/19
We present here new multivariate schemes that can be seen as HFE generalization having a property called `Two-Face'. Particularly, we present five such families of algorithms named `Dob', `Simple Pat'...
Authenticated Encryption in the Face of Protocol and Side Channel Leakage
provable security authenticated encryption generic composition
2017/2/20
Authenticated encryption schemes in practice have to be robust against adversaries that have access to various types of leakage, for instance decryption leakage on invalid ciphertext (protocol leakage...
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
Parameter Subversion CRS
2016/4/15
Motivated by the subversion of ``trusted'' public parameters in mass-surveillance activities, this paper studies the security of NIZKs in the presence of a maliciously chosen common reference string. ...
Privacy-Preserving Face Recognition with Outsourced Computation
applications Outsourced Computation
2016/1/5
Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data ra...
An ever-increasing number of personal photos is stored online. This trend can be problematic, because face recognition software can undermine user privacy in unexpected ways. Face de-identification ai...
Efficient Privacy-Preserving Face Recognition(Full Version)
Secure Two-Party Computation Face Recognition Privacy
2009/11/18
Automatic recognition of human faces is becoming increasingly
popular in civilian and law enforcement applications that require
reliable recognition of humans. However, the rapid improvement and
wi...