과제정보
연구 과제번호 : 차세대 인증 기술 개발
연구 과제 주관 기관 : 정보통신기술진흥센터, 한국연구재단
참고문헌
- 500 hours of video uploaded to YouTube every minute, [Online]. Available: http://www.reelseo.com/hours-minute-uploaded-youtube, 2016.
- X. Wu, A. G. Hauptmann, and C. W. Ngo, "Practical elimination of near-duplicates from web video search," Proc. of the 15th ACM international conference on Multimedia, 2007.
- H. R. Motahari-Nezhad, B. Stephenson, and S. Singhal, "Outsourcing business to cloud computing services: Opportunities and challenges," IEEE Internet Computing, 2009.
- D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," International Conference on the Theory and Applications of Cryptographic Techniques, 2004.
- M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and efficiently searchable encryption," Annual International Cryptology Conference, 2007.
- F. Bao, R. H. Deng, X. Ding, and Y. Yang, "Private query on encrypted data in multi-user settings," International Conference on Information Security Practice and Experience, 2008.
- C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," Distributed Computing Systems (ICDCS), 2010.
- Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE Transactions on Parallel and Distributed Systems, 2016.
- L. Liu, W. Lai, X. S. Hua, and S. Q. Yang, "Video histogram: A novel video signature for efficient web video duplicate detection," International Conference on Multimedia Modeling, 2007.
- X. Wu, A. G. Hauptmann, and C. W. Ngo, "Practical elimination of near-duplicates from web video search," Proc. of the 15th ACM international conference on Multimedia, 2007.
- M. Kuzu, M. S. Islam, and M. Kantarcioglu, "Enabling efficient fuzzy keyword search over encrypted data in cloud computing," IEEE Transactions on Parallel and Distributed Systems, 2010.
- X. Yuan, X. Wang, C. Wang, A. Squicciarini, and K. Ren, "Enabling privacy-preserving image-centric social discovery," Distributed Computing Systems (ICDCS), 2014.
- R. A. Popa and N. Zeldovich, "Multi-key searchable encryption," ACR Cryptology ePrint Archive, 2013.
- H. Cui, X. Yuan, Y. Zheng, and C. Wang, "Enabling secure and effective near-duplicate detection over encrypted in-network storage," In the 35th International Conference on Computer Communications (INFOCOM), 2016.
- C. Chen, Z. Zhang, and D. Feng, "Efficient ciphertext policy attribute-based encryption with constantsize ciphertext and constant computation-cost," International Conference on Provable Security, 2011.
- J. Yuan and S. Yu, "Efficient privacy-preserving biometric identification in cloud computing," INFOCOM, 2013.
- Q. Wang, S. Hu, K. Ren, M. He, M. Du, and Z. Wang, "Cloudbi: Practical privacy-preserving outsourcing of biometric identification in the cloud," European Symposium on Research in Computer Security, 2015.
- L. Ballard, S. Kamara, and F. Monrose, "efficient conjunctive keyword searches over encrypted data," International Conference on Information and Communications Security, 2005.
- P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," International Conference on Applied Cryptography and Network Security, 2004.
- M. Kuzu, M. S. Islam, and M. Kantarcioglu, "Enabling efficient fuzzy keyword search over encrypted data in cloud computing," IEEE Transactions on Parallel and Distributed Systems, 2010.
- M. Kuzu, M. S. Islam, and M. Kantarcioglu, "Efficient similarity search over encrypted data," IEEE 28th International Conference on Data Engineering, 2012.
- A. Gionis, P. Indyk, and R. Motwani, "Similarity search in high dimensions via hashing," VLDB, 1999.
- A. De Caro and V. Iovino, "jPBC: Java pairing based cryptography," Computers and Communications (ISCC), IEEE Symposium on, pp. 850-855, 2011.
- INRIA Copydays, [Online]. Available: http://lear.inrialpes.fr/
- Python Software Foundation, "ImageHash 2.2," [Online]. Available: https://pypi.python.org/pypi/Image-Hash