Text Compression and Encryption through Smart Devices for Mobile Communication
暂无分享,去创建一个
Bruno Carpentieri | Francesco Palmieri | Raffaele Pizzolante | Aniello Castiglione | Arcangelo Castiglione | Arcangelo Castiglione | Aniello Castiglione | F. Palmieri | Raffaele Pizzolante | B. Carpentieri
[1] Abraham Lempel,et al. Compression of individual sequences via variable-rate coding , 1978, IEEE Trans. Inf. Theory.
[2] Terry A. Welch,et al. A Technique for High-Performance Data Compression , 1984, Computer.
[3] Ian H. Witten,et al. Data Compression Using Adaptive Coding and Partial String Matching , 1984, IEEE Trans. Commun..
[4] M. W. Oliphant,et al. An introduction to GSM , 1995 .
[5] Michal Zemlicka,et al. Text Compression: Syllables , 2005, DATESO.
[6] Umberto Ferraro Petrillo,et al. SPEECH: Secure Personal End-to-End Communication with Handheld , 2006, ISSE.
[7] Frank H. P. Fitzek,et al. Low-complexity compression of short messages , 2006, Data Compression Conference (DCC'06).
[8] Michal Zemlicka,et al. Compression of small text files using syllables , 2006, Data Compression Conference (DCC'06).
[9] M.R. Islam,et al. Short text compression for smart devices , 2008, 2008 11th International Conference on Computer and Information Technology.
[10] Alfredo De Santis,et al. Do You Trust Your Phone? , 2009, EC-Web.
[11] Umberto Ferraro Petrillo,et al. An Extensible Framework for Efficient Secure SMS , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[12] Alfredo De Santis,et al. E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[13] Giuseppe Cattaneo,et al. SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[14] Umberto Ferraro Petrillo,et al. Engineering a secure mobile messaging framework , 2012, Comput. Secur..
[15] Alfredo De Santis,et al. An asynchronous covert channel using spam , 2012, Comput. Math. Appl..