A Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security
暂无分享,去创建一个
[1] Frank Dürr,et al. On location models for ubiquitous computing , 2004, Personal and Ubiquitous Computing.
[2] M. McLoone,et al. A high performance FPGA implementation of DES , 2000, 2000 IEEE Workshop on SiGNAL PROCESSING SYSTEMS. SiPS 2000. Design and Implementation (Cat. No.00TH8528).
[3] Ya-Ping Zhang,et al. A stream cipher algorithm based on conventional encryption techniques , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[4] S. Furuya,et al. A Lightweight Encryption Method Suitable For Copyright Protection , 1998, International 1998 Conference on Consumer Electronics.
[5] D. Mohapatra,et al. Survey of location based wireless services , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..
[6] Jianliang Xu,et al. The D-tree: an index structure for planar point queries in location-based wireless services , 2004, IEEE Transactions on Knowledge and Data Engineering.
[7] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[8] D. K. Branstad,et al. Data Encryption Standard: past and future , 1988, Proc. IEEE.
[9] Jianmin Jiang. Pipeline algorithms of RSA data encryption and data compression , 1996, Proceedings of International Conference on Communication Technology. ICCT '96.
[10] Yuewei Dai,et al. A fast video encryption scheme based-on chaos , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..
[11] M. Shaar,et al. A hybrid hiding encryption algorithm (HHEA) for data communication security , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[12] Hsien-Chou Liao,et al. A Novel Approach for Data Encryption Depending on User Location , 2006, PACIS.
[13] Richard Sharp,et al. Using smart phones to access site-specific services , 2005, IEEE Pervasive Computing.
[14] T. Jamil. The Rijndael algorithm , 2004, IEEE Potentials.
[15] Alex Pentland,et al. Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.
[16] Yuguang Fang,et al. Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.