{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:39:02Z","timestamp":1730230742278,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/icassp.2014.6854089","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T19:23:23Z","timestamp":1406661803000},"page":"2694-2698","source":"Crossref","is-referenced-by-count":5,"title":["SOFIR: Securely outsourced Forensic image recognition"],"prefix":"10.1109","author":[{"given":"Christoph","family":"Bosch","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Peter","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Hartel","sequence":"additional","affiliation":[]},{"given":"Willem","family":"Jonker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899541"},{"journal-title":"Implementation and Benchmarking of Perceptual Image Hash Functions","year":"2010","author":"zauner","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"journal-title":"FLINT Fast Library for Number Theory","year":"0","author":"hart","key":"14"},{"key":"11","first-page":"319","article-title":"Better key sizes (and attacks) for lwe-based encryption","volume":"6558","author":"lindner","year":"0","journal-title":"CT-RSA 2011 Aggelos Kiayias Ed 2011 of Lecture Notes in Computer Science"},{"key":"12","first-page":"113","article-title":"Can homomorphic encryption be practical?","author":"lauter","year":"2011","journal-title":"Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop"},{"journal-title":"Method and System of Monitoring A Data Stream","year":"2012","author":"bo?sch","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412629"},{"journal-title":"URL List Recipients","year":"2013","key":"1"},{"key":"10","first-page":"325","article-title":"Evaluating 2-dnf formulas on ciphertexts","volume":"3378","author":"boneh","year":"2005","journal-title":"TCC 2005 of Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2008.05.018"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"5","first-page":"1","article-title":"Fast confidential search for biomedical data using Bloom filters and Homomorphic Cryptography","author":"perl","year":"2012","journal-title":"eScience"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414506"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_26"},{"key":"8","first-page":"505","article-title":"Fully homomorphic encryption from ring-lwe and security for key dependent messages","volume":"6841","author":"brakerski","year":"0","journal-title":"CRYPTO 2011 Phillip Rogaway Ed 2011 of Lecture Notes in Computer Science"}],"event":{"name":"ICASSP 2014 - 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2014,5,4]]},"location":"Florence, Italy","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6844297\/6853544\/06854089.pdf?arnumber=6854089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:51:09Z","timestamp":1490287869000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6854089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icassp.2014.6854089","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}