Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key
暂无分享,去创建一个
[1] Kyungroul Lee,et al. Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System , 2011 .
[2] Radek Martinek,et al. Development and testing of a visualization application software, implemented with wireless control system in smart home care , 2014, Human-centric Computing and Information Sciences.
[3] T PandurangaH.,et al. Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator , 2013, J. Inf. Process. Syst..
[4] Chin-Tser Huang,et al. Chinese remainder theorem based group key management , 2007, ACM-SE 45.
[5] Marek R. Ogiela,et al. Security of Linguistic Threshold Schemes in Multimedia Systems , 2009, KES IIMSS.
[6] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[7] Wei-Ho Chung,et al. A Cross-Layer Unequal Error Protection Scheme for Prioritized H.264 Video using RCPC Codes and Hierarchical QAM , 2013, J. Inf. Process. Syst..
[8] F. Rico-Novella,et al. Improved LKH for batch rekeying in multicast groups , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..
[9] Elijah Blessing Rajsingh,et al. Smart card based time efficient authentication scheme for global grid computing , 2012, Human-centric Computing and Information Sciences.
[10] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[11] Vangalur S. Alagar,et al. Publishing and discovering context-dependent services , 2013, Human-centric Computing and Information Sciences.
[12] Marek R. Ogiela,et al. Linguistic protocols for secure information management and sharing , 2012, Comput. Math. Appl..
[13] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[14] Mamta Juneja,et al. A New Approach for Information Security using an Improved Steganography Technique , 2013, J. Inf. Process. Syst..
[15] Hua Wang,et al. A secure multicast protocol with copyright protection , 2002, CCRV.
[16] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[17] Adrian Perrig,et al. Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication , 1999 .
[18] Dongho Won,et al. Lightweight anonymous authentication scheme with unlinkability in global mobility networks , 2014 .
[19] Kyungran Kang,et al. A Distributed Multicast Group Key Management Scheme for a Hierarchically Structured Network , 2011 .
[20] Ashok Samal,et al. A dual encryption protocol for scalable secure multicasting , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).