Middleware Support for Tunable Encryption
暂无分享,去创建一个
[1] E. Bruce Lee,et al. Ciphers and their products: group theory in private key cryptography , 1999 .
[2] Frank Gadegast. Securitymechanisms for Multimedia-Data with the Example MPEG-I-Video , 1998 .
[3] Marc Van Droogenbroeck,et al. Techniques for a selective encryption of uncompressed and compressed images , 2002 .
[4] Douglas C. Sicker,et al. Selective encryption for consumer applications , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..
[5] Uwe Horn,et al. Video Encryption Based on Data Partitioning and Scalable Coding - A Comparison , 1998, IDMS.
[6] Ralf Steinmetz,et al. Protecting VoD the easier way , 1998, MULTIMEDIA '98.
[7] K. Schwan,et al. Dynamic authentication for high-performance networked applications , 1998, 1998 Sixth International Workshop on Quality of Service (IWQoS'98) (Cat. No.98EX136).
[8] Cynthia E. Irvine,et al. IPsec Modulation for Quality of Security Service , 2002 .
[9] Tracy Bradley Maples,et al. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[10] Juan Carlos De Martin,et al. Perception-based selective encryption of G.729 speech , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[11] Yongcheng Li,et al. Security enhanced MPEG player , 1996, Proceedings International Workshop on Multimedia Software Development.
[12] Henric Johnson,et al. Toward Adjustable Lightweight Authentication for Network Access Control , 2005 .
[13] Randall R. Stewart,et al. Stream Control Transmission Protocol , 2000, RFC.
[14] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[15] Stefan Lindskog,et al. Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages , 2006, Quality of Protection.
[16] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[17] Lei Tang,et al. Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.
[18] Erland Jonsson,et al. Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy , 2004 .
[19] Anantha Chandrakasan,et al. Low power scalable encryption for wireless systems , 1998, Wirel. Networks.
[20] Hesham H. Ali,et al. Impact of Employing Different Security Levels on QoS Parameters in Virtual Private Networks , 2006, Parallel and Distributed Computing and Networks.
[21] Bharat K. Bhargava,et al. An efficient MPEG video encryption algorithm , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[22] Charles P. Pfleeger,et al. Security in computing , 1988 .
[23] Andreas Uhl,et al. SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .
[24] A. Brunstrom,et al. Design and implementation of a tunable encryption service for networked applications , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[25] R. Stephenson. A and V , 1962, The British journal of ophthalmology.