Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection.
Sang-Pil KimMyeong-Sun GilHajin KimMi-Jung ChoiYang-Sae MoonHee-Sun WonPublished in: Secur. Commun. Networks (2017)
Keyphrases
- lightweight
- provably secure
- information retrieval
- cryptographic protocols
- covert channel
- key management
- feature selections
- key distribution
- standard model
- data sets
- text categorization
- object detection
- feature extraction
- image segmentation
- document collections
- information extraction
- security analysis
- security protocols
- object recognition
- authentication protocol
- security model
- training data
- feature selection
- homomorphic encryption
- scalar product
- neural network