Steganography-Based Secure Communication
暂无分享,去创建一个
Mahinder Pal Singh Bhatia | Manjot Bhatia | Sunil Kumar Muttoo | S. K. Muttoo | M. Bhatia | M. P. S. Bhatia
[1] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[2] Azman Samsudin,et al. Group Re-keying Protocol Based on Modular Polynomial Arithmetic Over Galois Field GF(2n) , 2009 .
[3] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[4] H. Raghav Rao,et al. Security in grid computing: A review and synthesis , 2008, Decis. Support Syst..
[5] Hai Jin,et al. A secure mechanism of group communication for pervasive grid , 2009, Int. J. Ad Hoc Ubiquitous Comput..
[6] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[7] V. Valli Kumari,et al. Secure Group Key Distribution Using Hybrid Cryptosystem , 2010, 2010 Second International Conference on Machine Learning and Computing.
[8] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[9] Yuan-Shun Dai,et al. Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups , 2007, Future Gener. Comput. Syst..
[10] John I Yellott,et al. Dipole statistics of discrete finite images: two visually motivated representation theorems. , 2002, Journal of the Optical Society of America. A, Optics, image science, and vision.
[11] Hai Jin,et al. An Authenticated Encryption Mechanism for Secure Group Communication in Grid , 2008, 2008 International Conference on Internet Computing in Science and Engineering.
[12] Haeryong Park,et al. Simple ID-Based Key Distribution Scheme , 2010, 2010 Fifth International Conference on Internet and Web Applications and Services.
[13] Ian T. Foster,et al. Grid Services for Distributed System Integration , 2002, Computer.
[14] G. Sivakumar,et al. EGSI: TGKA Based Security Architecture for Group Communication in Grid , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[15] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[16] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[17] Ian T. Foster,et al. The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..
[18] B. B. Amberker,et al. Dynamic Authenticated Secure Group Communication , 2007 .
[19] Haiyan Wang,et al. Grid authentication from identity-based cryptography without random oracles , 2008 .
[20] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[21] Hai Jin,et al. A Scalable Service Scheme for Secure Group Communication in Grid , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).