{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T17:59:20Z","timestamp":1776362360986,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540338369","type":"print"},{"value":"9783540338376","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11744078_1","type":"book-chapter","created":{"date-parts":[[2006,7,23]],"date-time":"2006-07-23T22:45:17Z","timestamp":1153694717000},"page":"1-13","source":"Crossref","is-referenced-by-count":36,"title":["Blind Vision"],"prefix":"10.1007","author":[{"given":"Shai","family":"Avidan","sequence":"first","affiliation":[]},{"given":"Moshe","family":"Butman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: WASDS2001: 7th International Workshop on Algorithms and Data Structures, Providence Rhode Island, USA, August 8-10, pp. 165\u2013179 (2001)","DOI":"10.1007\/3-540-44634-6_16"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Cachin, C.: Efficient private bidding and auctions with an oblivious third party. In: Proceedings of the 6th ACM conference on Computer and Communications Security, Singapore, November 1-4, pp. 120\u2013127 (1999)","DOI":"10.1145\/319709.319726"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45682-1_22","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"Y.C. Chang","year":"2001","unstructured":"Chang, Y.C., Lu, C.J.: Oblivious polynomial evaluation and oblivious neural learning. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 369. Springer, Heidelberg (2001)"},{"key":"1_CR4","unstructured":"Dalal, N., Triggs, B.: Histograms of Oriented Gradients for Human Detection. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR (2005)"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Communications of the ACM\u00a028, 637\u2013647 (1985)","journal-title":"Communications of the ACM"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Goldreich, O.: Foundations of Cryptography (2004)","DOI":"10.1017\/CBO9780511721656"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th ACM Symposium on the Theory of Computing, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-45146-4_9","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y. Ishai","year":"2003","unstructured":"Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending Oblivious Transfers Efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 145\u2013161. Springer, Heidelberg (2003)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, p. 36. Springer, Heidelberg (2000)"},{"issue":"2","key":"1_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D.G. Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision\u00a060(2), 91\u2013110 (2004)","journal-title":"International Journal of Computer Vision"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B.: Oblivious Polynomial Evaluation. In: Proc. of the 31st Symp. on Theory of Computer Science (STOC), Atlanta, GA, May 1-4, pp. 245\u2013254 (1999)","DOI":"10.1145\/301250.301312"},{"key":"1_CR12","unstructured":"Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: Proc. of the twelfth annual ACM-SIAM symposium on Discrete algorithms, Washington, D.C., USA, pp. 448\u2013457 (2001)"},{"key":"1_CR13","unstructured":"Rabin, M.O.: How to exchange secrets by oblivious transfer, Tech. Memo TR-81, Aiken Computation Laboratory (1981)"},{"key":"1_CR14","unstructured":"Schneier, B.: Applied Cryptography (1996)"},{"key":"1_CR15","unstructured":"Viola, P., Jones, M.: Rapid Object Detection using a Boosted Cascade of Simple Features. In: IEEE Conference on Computer Vision and Pattern Recognition, Hawaii (2001)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: 27th FOCS, pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11744078_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T01:30:15Z","timestamp":1736472615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11744078_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540338369","9783540338376"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11744078_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}