![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Verifiable Computation on Outsourced Encrypted Data
On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authe...
-
Chapter and Conference Paper
Exploiting Intensity Inhomogeneity to Extract Textured Objects from Natural Scenes
Extracting textured objects from natural scenes is a challenging task in computer vision. The main difficulties arise from the intrinsic randomness of natural textures and the high-semblance between the object...
-
Chapter and Conference Paper
Dual Phase Learning for Large Scale Video Gait Recognition
Accurate gait recognition from video is a complex process involving heterogenous features, and is still being developed actively. This article introduces a novel framework, called GC2F, for effective and efficien...
-
Chapter and Conference Paper
Visual Analytics for Supporting Entity Relationship Discovery on Text Data
To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant to a given information seekin...
-
Chapter and Conference Paper
Authenticating Multi-dimensional Query Results in Data Publishing
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produce incorrect query results. Th...
-
Chapter and Conference Paper
Authenticating Query Results in Data Publishing
We propose a communication-efficient authentication scheme to authenticate query results disseminated by untrusted data publishing servers. In our scheme, signatures of multiple tuples in the result set are ag...