A blind source separation based cryptography scheme for mobile military communication applications
暂无分享,去创建一个
[1] Peter Stavroulakis. TErrestrial Trunked RAdio - TETRA: A Global Security Tool , 2007 .
[2] José Antonio Apolinário,et al. Speech privacy for modern mobile communication systems , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[4] Faramarz Fekri,et al. Public-key cryptography using paraunitary matrices , 2006, IEEE Transactions on Signal Processing.
[5] Faramarz Fekri,et al. A block cipher cryptosystem using wavelet transforms over finite fields , 2004, IEEE Transactions on Signal Processing.
[6] Bharat K. Bhargava,et al. A scheme for privacy-preserving data dissemination , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[7] John A. MacDonald. Cellular authentication & key agreement for service providers , 2008, 2008 Second International Conference on Pervasive Computing Technologies for Healthcare.
[8] Min Wu,et al. A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.
[9] Hualou Liang,et al. A blind source separation based method for speech encryption , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[10] A. Drigas,et al. Adaptive encryption protocols , 2005 .
[11] Qiu-Hua Lin,et al. Secure image communication using blind source separation , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[12] Athanasios Drigas,et al. Stream Ciphers created by a Discrete Dynamic System for application in the Internet , 2004 .
[13] Guanrong Chen,et al. Cryptanalyzing an Encryption Scheme Based on Blind Source Separation , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[14] Jooheung Lee,et al. Block-based frequency scalable technique for efficient hierarchical coding , 2006, IEEE Transactions on Signal Processing.
[15] Ramiro Jordan,et al. Wireless communications and networking: an overview , 2002 .
[16] Rashid Ansari,et al. Robust Data Hiding in Audio Using Allpass Filters , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[17] Dr. N. G BARDIS. Method for designing pseudorandom binary sequences generators on Nonlinear Feedback Shift Register ( NFSR ) , 2004 .
[18] S. Behbahani,et al. Transmitting Encrypted Data by Wavelet Transform and Neural Network , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.
[19] Andrzej Cichocki,et al. Neural networks for optimization and signal processing , 1993 .
[20] Enrico Magli,et al. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.
[21] Scott T. Rickard,et al. A general framework for extending classic array processing techniques to the underdetermined blind source separation problem , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.
[22] Andreas Willig,et al. Recent and Emerging Topics in Wireless Industrial Communications: A Selection , 2008, IEEE Transactions on Industrial Informatics.
[23] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[24] Athanasios Drigas,et al. Quantum Key Distribution and Adaptive Protocols. , 2004 .