Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems
暂无分享,去创建一个
[1] Lintian Qiao,et al. A New Algorithm for MPEG Video Encryption , 2007 .
[2] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[3] Gustavus J. Simmons,et al. Prepositioned Shared Secret and/or Shared Control Schemes , 1990, EUROCRYPT.
[4] David Murakami Wood,et al. The Growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space , 2002 .
[5] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[6] Andreas Uhl,et al. SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .
[7] Xiaodong Cai,et al. MPEG4 over local area mobile surveillance system , 2003 .
[8] Mansour Moniri,et al. Classification of smart video surveillance systems for commercial applications , 2005, IEEE Conference on Advanced Video and Signal Based Surveillance, 2005..
[9] Nicholas Carriero,et al. Adaptive Parallelism and Piranha , 1995, Computer.
[10] Joseph Bonneau,et al. Cache-Collision Timing Attacks Against AES , 2006, CHES.
[11] Polychronis Koutsakis,et al. Integrated wireless access for videoconference from MPEG-4 and H.263 video coders with voice, E-mail, and web traffic , 2005, IEEE Transactions on Vehicular Technology.
[12] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[13] Clifton L. Smith,et al. The understanding of security technology and its applications , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[14] A. Al Hasib,et al. A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[15] Bernhard Rinner,et al. Distributed embedded smart cameras for surveillance applications , 2006, Computer.
[16] P. Venkat Rangan,et al. Multimedia Storage Servers: A Tutorial , 1995, Computer.
[17] Anja Becker,et al. Assessing privacy criteria for drm using eu privacy legislation , 2008, DRM '08.
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Wayne H. Wolf,et al. Smart Cameras as Embedded Systems , 2002, Computer.