An image-based key agreement protocol using the morphing technique
暂无分享,去创建一个
[1] George Wolberg,et al. Skeleton-based image warping , 2005, The Visual Computer.
[2] Matthieu R. Bloch,et al. Semi-Blind Key-Agreement over MIMO Fading Channels , 2013, IEEE Transactions on Communications.
[3] Guillermo Sapiro,et al. Image inpainting , 2000, SIGGRAPH.
[4] Eli Biham,et al. Near-Collisions of SHA-0 , 2004, CRYPTO.
[5] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[6] Jeng-Shyang Pan,et al. Reversible data hiding based on multilevel histogram modification and sequential recovery , 2011 .
[7] Cheng-Hsiung Hsieh,et al. Card user authentication based on generalized image morphing , 2011, 2011 3rd International Conference on Awareness Science and Technology (iCAST).
[8] P. Kanongchaiyos,et al. Face morphing using critical point filters , 2012, 2012 Ninth International Conference on Computer Science and Software Engineering (JCSSE).
[9] Lei Zhu,et al. An Image Morphing Technique Based on Optimal Mass Preserving Mapping , 2007, IEEE Transactions on Image Processing.
[10] Thaddeus Beier,et al. Feature-based image metamorphosis , 1992, SIGGRAPH.
[11] Naixue Xiong,et al. A real-time dynamic key management for hierarchical wireless multimedia sensor network , 2013, Multimedia Tools and Applications.
[12] H. Vincent Poor,et al. A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.
[13] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[14] Paulo S. L. M. Barreto,et al. A New Two-Party Identity-Based Authenticated Key Agreement , 2005, CT-RSA.
[15] Mohammad Reza Aref,et al. Key Agreement Over Multiple Access Channel , 2011, IEEE Transactions on Information Forensics and Security.
[16] Qiangfu Zhao,et al. Information Hiding Based on Image Morphing , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[19] Farrukh Aslam Khan,et al. A cluster-based key agreement scheme using keyed hashing for Body Area Networks , 2011, Multimedia Tools and Applications.
[20] Gene Tsudik,et al. Flexible Robust Group Key Agreement , 2011, IEEE Transactions on Parallel and Distributed Systems.
[21] Lein Harn,et al. Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2010, IEEE Transactions on Computers.
[22] Zhenfu Cao,et al. An improved identity-based key agreement protocol and its security proof , 2009, Inf. Sci..
[23] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[24] Chin-Chen Chang,et al. Edge directed automatic control point selection algorithm for image morphing , 2013 .
[25] Cheng-Hsiung Hsieh,et al. Generating facial images for steganography based on IGA and image morphing , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[26] Masao Kasahara,et al. ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..
[27] Hassan M. Elkamchouchi,et al. An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).