Keyword : privacy-preserving


Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services
Kenta IIDA Hitoshi KIYA 
Publication:   
Publication Date: 2020/01/01
Vol. E103-D  No. 1 ; pp. 25-32
Type of Manuscript:  Special Section PAPER (Special Section on Enriched Multimedia — Application of Multimedia Technology and Its Security —)
Category: 
Keyword: 
image identificationJPEGEncryption-then-Compression systemprivacy-preserving
 Summary | Full Text:PDF

Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation
Takahiro MAEKAWA Ayana KAWAMURA Takayuki NAKACHI Hitoshi KIYA 
Publication:   
Publication Date: 2019/12/01
Vol. E102-A  No. 12 ; pp. 1849-1855
Type of Manuscript:  Special Section PAPER (Special Section on Smart Multimedia & Communication Systems)
Category: Image
Keyword: 
support vector machineprivacy-preservingrandom unitary transformation
 Summary | Full Text:PDF

Privacy-Preserving Model of IoT Based Trust Evaluation
Zhenguo CHEN Liqin TIAN 
Publication:   
Publication Date: 2017/02/01
Vol. E100-D  No. 2 ; pp. 371-374
Type of Manuscript:  LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
privacy-preservingInternet of thingstrust evaluationdata security
 Summary | Full Text:PDF | Errata[Uploaded on March 1,2017]

An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing
Kai HUANG Ming XU Shaojing FU Yuchuan LUO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/10/01
Vol. E99-A  No. 10 ; pp. 1891-1894
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
improved schemeprivacy-preservingbiometric identificationcloud computing
 Summary | Full Text:PDF

Privacy-Preserving Statistical Analysis Method by Splitting Server Roles for Distributed Real-World Data
Jun ISHII Hiroyuki MAEOMICHI Akihiro TSUTSUI Ikuo YODA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2014/09/01
Vol. E97-B  No. 9 ; pp. 1779-1789
Type of Manuscript:  Special Section PAPER (Special Section on Ambient Intelligence and Sensor Networks)
Category: 
Keyword: 
privacy-preservingmultiple pseudonymsquery auditingWebSocketin-memory database
 Summary | Full Text:PDF

Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments
Youwen ZHU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 409-412
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
reputation evaluationdecentralized environmentprivacy-preservingcommunication delay
 Summary | Full Text:PDF

Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing
Jining ZHAO Chunxiang XU Fagen LI Wenzheng ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12 ; pp. 2709-2716
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cloud computingstorage securityidentity-basedpublic verificationprivacy-preserving
 Summary | Full Text:PDF

Fourier Magnitude-Based Privacy-Preserving Clustering on Time-Series Data
Hea-Suk KIM Yang-Sae MOON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/06/01
Vol. E93-D  No. 6 ; pp. 1648-1651
Type of Manuscript:  LETTER
Category: Artificial Intelligence, Data Mining
Keyword: 
time-series dataclusteringprivacy-preservingFourier magnitudedistance order
 Summary | Full Text:PDF

Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
Chunhua SU Feng BAO Jianying ZHOU Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 1868-1871
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
data clusteringprivacy-preservingrandom data perturbation
 Summary | Full Text:PDF

Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
Chunhua SU Feng BAO Jianying ZHOU Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/04/01
Vol. E92-A  No. 4 ; pp. 1246-1250
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
privacy-preservingk-means clusteringsecurity analysis
 Summary | Full Text:PDF

Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
Yang CUI Kazukuni KOBARA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1457-1465
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Authentication
Keyword: 
lightweight protocolasymmetric authenticationprivacy-preservingactive attack
 Summary | Full Text:PDF

Mining Frequent Patterns Securely in Distributed System
Jiahong WANG Takuya FUKASAWA Shintaro URABE Toyoo TAKATA Masatoshi MIYAZAKI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/11/01
Vol. E89-D  No. 11 ; pp. 2739-2747
Type of Manuscript:  PAPER
Category: Data Mining
Keyword: 
data miningdistributed computingprivacy-preservingperformance evaluation
 Summary | Full Text:PDF