Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing Pipeline View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018-09-01

AUTHORS

Donald Nokam Kuate , Sebastien Canard , Renaud Sirdey

ABSTRACT

Image/video compression is a widely used operation in our everyday life. Such an operation usually proceeds independantly on small rectangular portions, so-called macroblocks, and is mainly divided into four operations: color conversion, Discrete Cosine Transform (DCT), quantization and entropic encoding. This operation is carried out easily on non-encrypted image. In this paper, we consider the case where such an execution is done in the encrypted domain. In fact, this is today one central question related to individuals’ privacy since such image/video compression is most of the time done on the premises of a service provider data center, and pictures are potentially sensitive personal data. Thus, the capacity for such entity to perform an action “blindfolded”, that is not knowing the underlying input in plain, is an important topic since it permits to obtain both individual privacy and data usability. In this context, one of the main cryptographic tool is (fully) homomorphic encryption (FHE), that permits to perform operations while keeping the data encrypted. We here consider two different instantiations of FHE, one for which the plaintext space is binary () and the other a modular space ( for an integer ), and compare them when running the well-known H264 and HEVC macroblock processing pipelines. Our contribution is twofold. On one hand, we provide an exhaustive comparison between FHEs over and FHEs over () in terms of functional capabilities, multiplicative depth and real performances using several existing FHE implementations, over libraries such as Cingulata, SEAL and TFHE. On the other hand, we apply this to image compression in the encrypted domain, being the first to “crypto-compress” a full encrypted photograph with practically relevant performances. More... »

PAGES

109-129

References to SciGraph publications

  • 2016. Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? in TOPICS IN CRYPTOLOGY - CT-RSA 2016
  • 2018-03-31. Homomorphic Lower Digits Removal and Improved FHE Bootstrapping in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2018
  • 2007. Practical and Secure Solutions for Integer Comparison in PUBLIC KEY CRYPTOGRAPHY – PKC 2007
  • 2016. Homomorphically Encrypted Arithmetic Operations Over the Integer Ring in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2017. Simple Encrypted Arithmetic Library - SEAL v2.1 in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2017. Fixed-Point Arithmetic in SHE Schemes in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2016
  • 2014. A Comparison of the Homomorphic Encryption Schemes FV and YASHE in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2014
  • Book

    TITLE

    Cryptology and Network Security

    ISBN

    978-3-030-00433-0
    978-3-030-00434-7

    Author Affiliations

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-030-00434-7_6

    DOI

    http://dx.doi.org/10.1007/978-3-030-00434-7_6

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1106474130


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Orange (France)", 
              "id": "https://www.grid.ac/institutes/grid.89485.38", 
              "name": [
                "Orange Labs, Applied Crypto Group, Caen, France", 
                "CEA, LIST, Gif-sur-Yvette, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kuate", 
            "givenName": "Donald Nokam", 
            "id": "sg:person.012733453174.69", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012733453174.69"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Orange (France)", 
              "id": "https://www.grid.ac/institutes/grid.89485.38", 
              "name": [
                "Orange Labs, Applied Crypto Group, Caen, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Canard", 
            "givenName": "Sebastien", 
            "id": "sg:person.014305220275.30", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014305220275.30"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "CEA, LIST, Gif-sur-Yvette, France"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sirdey", 
            "givenName": "Renaud", 
            "id": "sg:person.011511456441.41", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011511456441.41"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-319-49151-6_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021939528", 
              "https://doi.org/10.1007/978-3-319-49151-6_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-29485-8_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033277977", 
              "https://doi.org/10.1007/978-3-319-29485-8_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-06734-6_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038395684", 
              "https://doi.org/10.1007/978-3-319-06734-6_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-71677-8_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040796585", 
              "https://doi.org/10.1007/978-3-540-71677-8_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2502081.2502105", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046075000"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/jstsp.2013.2270429", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061338294"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tcsvt.2003.814964", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061574443"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1504/ijact.2008.017048", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1067430003"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-69453-5_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1092291539", 
              "https://doi.org/10.1007/978-3-319-69453-5_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-70278-0_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1092752084", 
              "https://doi.org/10.1007/978-3-319-70278-0_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infcomw.2015.7179367", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094051415"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-78381-9_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1101874806", 
              "https://doi.org/10.1007/978-3-319-78381-9_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-78381-9_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1101874806", 
              "https://doi.org/10.1007/978-3-319-78381-9_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/pst.2017.00041", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1107393251"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2018-09-01", 
        "datePublishedReg": "2018-09-01", 
        "description": "Image/video compression is a widely used operation in our everyday life. Such an operation usually proceeds independantly on small rectangular portions, so-called macroblocks, and is mainly divided into four operations: color conversion, Discrete Cosine Transform (DCT), quantization and entropic encoding. This operation is carried out easily on non-encrypted image. In this paper, we consider the case where such an execution is done in the encrypted domain. In fact, this is today one central question related to individuals\u2019 privacy since such image/video compression is most of the time done on the premises of a service provider data center, and pictures are potentially sensitive personal data. Thus, the capacity for such entity to perform an action \u201cblindfolded\u201d, that is not knowing the underlying input in plain, is an important topic since it permits to obtain both individual privacy and data usability. In this context, one of the main cryptographic tool is (fully) homomorphic encryption (FHE), that permits to perform operations while keeping the data encrypted. We here consider two different instantiations of FHE, one for which the plaintext space is binary () and the other a modular space ( for an integer ), and compare them when running the well-known H264 and HEVC macroblock processing pipelines. Our contribution is twofold. On one hand, we provide an exhaustive comparison between FHEs over and FHEs over () in terms of functional capabilities, multiplicative depth and real performances using several existing FHE implementations, over libraries such as Cingulata, SEAL and TFHE. On the other hand, we apply this to image compression in the encrypted domain, being the first to \u201ccrypto-compress\u201d a full encrypted photograph with practically relevant performances.", 
        "editor": [
          {
            "familyName": "Camenisch", 
            "givenName": "Jan", 
            "type": "Person"
          }, 
          {
            "familyName": "Papadimitratos", 
            "givenName": "Panos", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-030-00434-7_6", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-030-00433-0", 
            "978-3-030-00434-7"
          ], 
          "name": "Cryptology and Network Security", 
          "type": "Book"
        }, 
        "name": "Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing Pipeline", 
        "pagination": "109-129", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1106474130"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-030-00434-7_6"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "ef836b4bcd4d0cdfee376b53fb9ceb37fd07864eda48d96415dc383307e94111"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-030-00434-7_6", 
          "https://app.dimensions.ai/details/publication/pub.1106474130"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T08:06", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000359_0000000359/records_29222_00000003.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-030-00434-7_6"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-00434-7_6'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-00434-7_6'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-00434-7_6'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-00434-7_6'


     

    This table displays all metadata directly associated to this object as RDF triples.

    133 TRIPLES      23 PREDICATES      39 URIs      19 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-030-00434-7_6 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N14bc4620edf644e3b0d851b4cd880e43
    4 schema:citation sg:pub.10.1007/978-3-319-06734-6_20
    5 sg:pub.10.1007/978-3-319-29485-8_19
    6 sg:pub.10.1007/978-3-319-49151-6_12
    7 sg:pub.10.1007/978-3-319-69453-5_22
    8 sg:pub.10.1007/978-3-319-70278-0_1
    9 sg:pub.10.1007/978-3-319-78381-9_12
    10 sg:pub.10.1007/978-3-540-71677-8_22
    11 https://doi.org/10.1109/infcomw.2015.7179367
    12 https://doi.org/10.1109/jstsp.2013.2270429
    13 https://doi.org/10.1109/pst.2017.00041
    14 https://doi.org/10.1109/tcsvt.2003.814964
    15 https://doi.org/10.1145/2502081.2502105
    16 https://doi.org/10.1504/ijact.2008.017048
    17 schema:datePublished 2018-09-01
    18 schema:datePublishedReg 2018-09-01
    19 schema:description Image/video compression is a widely used operation in our everyday life. Such an operation usually proceeds independantly on small rectangular portions, so-called macroblocks, and is mainly divided into four operations: color conversion, Discrete Cosine Transform (DCT), quantization and entropic encoding. This operation is carried out easily on non-encrypted image. In this paper, we consider the case where such an execution is done in the encrypted domain. In fact, this is today one central question related to individuals’ privacy since such image/video compression is most of the time done on the premises of a service provider data center, and pictures are potentially sensitive personal data. Thus, the capacity for such entity to perform an action “blindfolded”, that is not knowing the underlying input in plain, is an important topic since it permits to obtain both individual privacy and data usability. In this context, one of the main cryptographic tool is (fully) homomorphic encryption (FHE), that permits to perform operations while keeping the data encrypted. We here consider two different instantiations of FHE, one for which the plaintext space is binary () and the other a modular space ( for an integer ), and compare them when running the well-known H264 and HEVC macroblock processing pipelines. Our contribution is twofold. On one hand, we provide an exhaustive comparison between FHEs over and FHEs over () in terms of functional capabilities, multiplicative depth and real performances using several existing FHE implementations, over libraries such as Cingulata, SEAL and TFHE. On the other hand, we apply this to image compression in the encrypted domain, being the first to “crypto-compress” a full encrypted photograph with practically relevant performances.
    20 schema:editor N82951756b00443fd92546d876364dd30
    21 schema:genre chapter
    22 schema:inLanguage en
    23 schema:isAccessibleForFree false
    24 schema:isPartOf N8e5e74947e6845f1a2e1a189f4391649
    25 schema:name Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing Pipeline
    26 schema:pagination 109-129
    27 schema:productId N0a6c6235e17f4730af244313e5c110b0
    28 N2c967fdf95ee4b78b4f6029bccfd9983
    29 Nc717b35158f94376afb8ae2d37f19ade
    30 schema:publisher Nd0ef2805ceca4df2acda3741e468d26d
    31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1106474130
    32 https://doi.org/10.1007/978-3-030-00434-7_6
    33 schema:sdDatePublished 2019-04-16T08:06
    34 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    35 schema:sdPublisher N5ad18e9de5354fbfa7ea8933f6ba8977
    36 schema:url https://link.springer.com/10.1007%2F978-3-030-00434-7_6
    37 sgo:license sg:explorer/license/
    38 sgo:sdDataset chapters
    39 rdf:type schema:Chapter
    40 N0a6c6235e17f4730af244313e5c110b0 schema:name readcube_id
    41 schema:value ef836b4bcd4d0cdfee376b53fb9ceb37fd07864eda48d96415dc383307e94111
    42 rdf:type schema:PropertyValue
    43 N14bc4620edf644e3b0d851b4cd880e43 rdf:first sg:person.012733453174.69
    44 rdf:rest Ncc6410008a1e4da49012f3cb516dcac3
    45 N2c967fdf95ee4b78b4f6029bccfd9983 schema:name doi
    46 schema:value 10.1007/978-3-030-00434-7_6
    47 rdf:type schema:PropertyValue
    48 N498a210e72d049dfbad45bb2b7334c1c schema:familyName Papadimitratos
    49 schema:givenName Panos
    50 rdf:type schema:Person
    51 N5ad18e9de5354fbfa7ea8933f6ba8977 schema:name Springer Nature - SN SciGraph project
    52 rdf:type schema:Organization
    53 N5f809508102843c69324f2b7d77d75e6 rdf:first N498a210e72d049dfbad45bb2b7334c1c
    54 rdf:rest rdf:nil
    55 N82951756b00443fd92546d876364dd30 rdf:first Nd9de103fc8ef4ae79691ffefb07ce0da
    56 rdf:rest N5f809508102843c69324f2b7d77d75e6
    57 N8e5e74947e6845f1a2e1a189f4391649 schema:isbn 978-3-030-00433-0
    58 978-3-030-00434-7
    59 schema:name Cryptology and Network Security
    60 rdf:type schema:Book
    61 Nc717b35158f94376afb8ae2d37f19ade schema:name dimensions_id
    62 schema:value pub.1106474130
    63 rdf:type schema:PropertyValue
    64 Ncc6410008a1e4da49012f3cb516dcac3 rdf:first sg:person.014305220275.30
    65 rdf:rest Nf63c0b559b7848219ef1dcdcca1478b4
    66 Nd0ef2805ceca4df2acda3741e468d26d schema:location Cham
    67 schema:name Springer International Publishing
    68 rdf:type schema:Organisation
    69 Nd9de103fc8ef4ae79691ffefb07ce0da schema:familyName Camenisch
    70 schema:givenName Jan
    71 rdf:type schema:Person
    72 Ned0a43e7f8174d3383bb3a356d55eb14 schema:name CEA, LIST, Gif-sur-Yvette, France
    73 rdf:type schema:Organization
    74 Nf63c0b559b7848219ef1dcdcca1478b4 rdf:first sg:person.011511456441.41
    75 rdf:rest rdf:nil
    76 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    77 schema:name Information and Computing Sciences
    78 rdf:type schema:DefinedTerm
    79 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    80 schema:name Data Format
    81 rdf:type schema:DefinedTerm
    82 sg:person.011511456441.41 schema:affiliation Ned0a43e7f8174d3383bb3a356d55eb14
    83 schema:familyName Sirdey
    84 schema:givenName Renaud
    85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011511456441.41
    86 rdf:type schema:Person
    87 sg:person.012733453174.69 schema:affiliation https://www.grid.ac/institutes/grid.89485.38
    88 schema:familyName Kuate
    89 schema:givenName Donald Nokam
    90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012733453174.69
    91 rdf:type schema:Person
    92 sg:person.014305220275.30 schema:affiliation https://www.grid.ac/institutes/grid.89485.38
    93 schema:familyName Canard
    94 schema:givenName Sebastien
    95 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014305220275.30
    96 rdf:type schema:Person
    97 sg:pub.10.1007/978-3-319-06734-6_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038395684
    98 https://doi.org/10.1007/978-3-319-06734-6_20
    99 rdf:type schema:CreativeWork
    100 sg:pub.10.1007/978-3-319-29485-8_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033277977
    101 https://doi.org/10.1007/978-3-319-29485-8_19
    102 rdf:type schema:CreativeWork
    103 sg:pub.10.1007/978-3-319-49151-6_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021939528
    104 https://doi.org/10.1007/978-3-319-49151-6_12
    105 rdf:type schema:CreativeWork
    106 sg:pub.10.1007/978-3-319-69453-5_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092291539
    107 https://doi.org/10.1007/978-3-319-69453-5_22
    108 rdf:type schema:CreativeWork
    109 sg:pub.10.1007/978-3-319-70278-0_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092752084
    110 https://doi.org/10.1007/978-3-319-70278-0_1
    111 rdf:type schema:CreativeWork
    112 sg:pub.10.1007/978-3-319-78381-9_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1101874806
    113 https://doi.org/10.1007/978-3-319-78381-9_12
    114 rdf:type schema:CreativeWork
    115 sg:pub.10.1007/978-3-540-71677-8_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040796585
    116 https://doi.org/10.1007/978-3-540-71677-8_22
    117 rdf:type schema:CreativeWork
    118 https://doi.org/10.1109/infcomw.2015.7179367 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094051415
    119 rdf:type schema:CreativeWork
    120 https://doi.org/10.1109/jstsp.2013.2270429 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061338294
    121 rdf:type schema:CreativeWork
    122 https://doi.org/10.1109/pst.2017.00041 schema:sameAs https://app.dimensions.ai/details/publication/pub.1107393251
    123 rdf:type schema:CreativeWork
    124 https://doi.org/10.1109/tcsvt.2003.814964 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061574443
    125 rdf:type schema:CreativeWork
    126 https://doi.org/10.1145/2502081.2502105 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046075000
    127 rdf:type schema:CreativeWork
    128 https://doi.org/10.1504/ijact.2008.017048 schema:sameAs https://app.dimensions.ai/details/publication/pub.1067430003
    129 rdf:type schema:CreativeWork
    130 https://www.grid.ac/institutes/grid.89485.38 schema:alternateName Orange (France)
    131 schema:name CEA, LIST, Gif-sur-Yvette, France
    132 Orange Labs, Applied Crypto Group, Caen, France
    133 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...