A New Compression Scheme for Secure Transmission
暂无分享,去创建一个
[1] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[2] Wing-Kai Hon,et al. Geometric Burrows-Wheeler Transform: Linking Range Searching and Text Indexing , 2008, Data Compression Conference (dcc 2008).
[3] Cheng-Hsing Yang,et al. A fast algorithm for Huffman decoding based on a recursion Huffman tree , 2012, J. Syst. Softw..
[4] Travis Gagie,et al. Move-to-Front, Distance Coding, and Inversion Frequencies revisited , 2010, Theor. Comput. Sci..
[5] S. Bhadade Umesh,et al. Lossless Text Compression using Dictionaries , 2011 .
[6] Wing-Kai Hon,et al. Compressed text indexing with wildcards , 2013, J. Discrete Algorithms.
[7] Oscar C. Au,et al. Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding , 2009, IEEE Transactions on Signal Processing.
[8] M. Oguzhan Külekci. On scrambling the Burrows-Wheeler transform to provide privacy in lossless compression , 2012, Comput. Secur..
[9] Oscar C. Au,et al. Secure Lempel-Ziv-Welch (LZW) algorithm with random dictionary insertion and permutation , 2008, 2008 IEEE International Conference on Multimedia and Expo.
[10] Joaquín Adiego,et al. Natural Language Compression on Edge-Guided text preprocessing , 2011, Inf. Sci..
[11] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[12] Sushil Kumar,et al. A Temporal Database Compression with Differential Method , 2012 .
[13] Wing-Kai Hon,et al. Compression, Indexing, and Retrieval for Massive String Data , 2010, CPM.
[14] V. K. Govindan,et al. Compression scheme for faster and secure data transmission over networks , 2005, International Conference on Mobile Business (ICMB'05).
[15] Khalid Sayood,et al. Introduction to data compression (2nd ed.) , 2000 .
[16] Gonzalo Navarro,et al. Compressed full-text indexes , 2007, CSUR.
[17] Atsa Etoundi Roger,et al. A Formal Framework for Business Process Modeling , 2011 .
[18] Y. Venkataramani,et al. LSB Based Audio Steganography Based On Text Compression , 2012 .
[19] Hugo Krawczyk,et al. On Compression of Data Encrypted With Block Ciphers , 2012, IEEE Transactions on Information Theory.
[20] Hussein Al-Bahadili,et al. A bit-level text compression scheme based on the ACW algorithm , 2010, Int. J. Autom. Comput..
[21] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[22] Raphael C.-W. Phan,et al. On the security of the WinRAR encryption feature , 2006, International Journal of Information Security.
[23] Sos S. Agaian,et al. Cipherstream covering for secure data compression , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.
[24] Hyungjin Kim,et al. Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.
[25] Khalid Sayood,et al. Introduction to Data Compression , 1996 .
[26] Jirapond Tadrat,et al. An Experiment Study on Text Transformation for Compression Using Stoplists and Frequent Words , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[27] Haim Kaplan,et al. Most Burrows-Wheeler Based Compressors Are Not Optimal , 2007, CPM.
[28] David Salomon,et al. Data Compression: The Complete Reference , 2006 .
[29] A. Carus,et al. Fast Text Compression Using Multiple Static Dictionaries , 2010 .