Multimedia encryption and authentication techniques and applications / editors in chief and Authors Borko Furht, Darko Kirovski.
Saved in:
Other Authors: | Furht, Borivoje, Kirovski, Darko |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton, Fla. :
Auerbach Publications,
2006.
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Loading…
Multimedia watermaking techniques and applications / editors-in-chief and authors, Borko Furht, Darko Kirovski.
Published: (2006)
Published: (2006)
Loading…
Multimedia encryption and watermarking / Borko Furht, Edin Muharemagic and Daniel Socek.
by: Furht, Borko
Published: (2005)
by: Furht, Borko
Published: (2005)
Loading…
Multimedia content encryption : techniques and applications / Shiguo Lian.
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Loading…
Multimedia information hiding technologies and methodologies for controlling data Kazuhiro Kondo, editor.
Published: (2013)
Published: (2013)
Loading…
Image encryption a communication perspective / Fathi E. Abd El-Samie ... [et al].
Published: (2014)
Published: (2014)
Loading…
Security and watermarking of multimedia contents IV : 21-24 January 2002, San Jose, USA / Edward J. Delp III, Ping Wah Wong, chairs/editors.
Published: (2002)
Published: (2002)
Loading…
Introduction to identity-based encryption / Luther Martin.
by: Martin, Luther
Published: (2008)
by: Martin, Luther
Published: (2008)
Loading…
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption
by: Yogachandran Rahulamathavan, et al.
Published: (2018)
by: Yogachandran Rahulamathavan, et al.
Published: (2018)
Loading…
Handbook of cloud computing / Borko Furht, Armando Escalante, editors.
Published: (2010)
Published: (2010)
Loading…
Handbook of social network technologies and applications / Borko Furht, editor.
Published: (2010)
Published: (2010)
Loading…
Automatic selective encryption of DICOM images
by: Qamar Natsheh, et al.
Published: (2023)
by: Qamar Natsheh, et al.
Published: (2023)
Loading…
Encryption of images file using a user controlled automatically-generated key
by: Halima Abdul halime Shnishah, et al.
Published: (2018)
by: Halima Abdul halime Shnishah, et al.
Published: (2018)
Loading…
Cryptography and network security : principles and practice / William Stallings.
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Loading…
Encryption of text file using a user controlled automatically-generated key
by: Halima Shnishah, et al.
Published: (2019)
by: Halima Shnishah, et al.
Published: (2019)
Loading…
Malicious attack propagation and source identification / Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.
by: Jiang, Jiaojiao, et al.
Published: (2019)
by: Jiang, Jiaojiao, et al.
Published: (2019)
Loading…
Theory and practice of cryptography solutions for secure information systems Atilla Elçi ... [et al.], editors.
Published: (2013)
Published: (2013)
Loading…
Modern cryptanalysis : techniques for advanced code breaking / Christopher Swenson.
by: Swenson, Christopher, 1983-
Published: (2008)
by: Swenson, Christopher, 1983-
Published: (2008)
Loading…
Multimedia content representation, classification and security : international workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006 / proceedings ; Bilge Gunsel .... [et al.].
Published: (2006)
Published: (2006)
Loading…
Group theoretic cryptography / Maria Isabel Gonzalez Vasco, Rainer Steinwandt.
by: Gonzalez Vasco, Maria Isabel, et al.
Published: (2015)
by: Gonzalez Vasco, Maria Isabel, et al.
Published: (2015)
Loading…
Group theoretic cryptography Maria Isabel González Vasco, Rainer Steinwandt.
by: Vasco, Maria Isabel González, et al.
Published: (2015)
by: Vasco, Maria Isabel González, et al.
Published: (2015)
Loading…
CNN for user activity detection using encrypted in-app mobile data
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2022)
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2022)
Loading…
In-app activity recognition from Wi-Fi encrypted traffic
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2020)
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2020)
Loading…
Codes : the guide to secrecy from ancient to modern times / Richard A. Mollin.
by: Mollin, Richard A., 1947-
Published: (2005)
by: Mollin, Richard A., 1947-
Published: (2005)
Loading…
Medical image encryption using chaotic map improved advanced encryption standard
by: Ranvir S. Bhogal, et al.
Published: (2018)
by: Ranvir S. Bhogal, et al.
Published: (2018)
Loading…
Cryptography and network security principles and practice / William Stallings.
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Loading…
Cryptography and network security : principles and practice / William Stallings.
by: Stallings, William, et al.
Published: (2014)
by: Stallings, William, et al.
Published: (2014)
Loading…
Cryptography and network security principles and practices / William Stallings.
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Loading…
Cryptography and network security : principles and practice / William Stallings.
by: Stallings, William
by: Stallings, William
Loading…
Codes, cryptology, and information security : first International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings : in honor of Thierry Berger / Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi (eds.).
Published: (2015)
Published: (2015)
Loading…
Privacy on the line : the politics of wiretapping and encryption / Whitfield Diffie, Susan Landau.
by: Diffie, Whitfield
Published: (1998)
by: Diffie, Whitfield
Published: (1998)
Loading…
Cryptography for dummies / by Chey Cobb.
by: Cobb, Chey
Published: (2004)
by: Cobb, Chey
Published: (2004)
Loading…
Applied cryptanalysis breaking ciphers in the real world / Mark Stamp, Richard M. Low.
by: Stamp, Mark
Published: (2007)
by: Stamp, Mark
Published: (2007)
Loading…
Applied cryptanalysis : breaking ciphers in the real world / Mark Stamp, Richard M. Low.
by: Stamp, Mark
Published: (2007)
by: Stamp, Mark
Published: (2007)
Loading…
User mobile app encrypted activity detection
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2021)
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2021)
Loading…
Multimedia authoring : building and developing documents / Scott Fisher.
by: Fisher, Scott, 1956-
Published: (1994)
by: Fisher, Scott, 1956-
Published: (1994)
Loading…
A new secure and lightweight searchable encryption scheme over encrypted cloud data
by: Shahzaib Tahir, et al.
Published: (2017)
by: Shahzaib Tahir, et al.
Published: (2017)
Loading…
A new lightweight symmetric searchable encryption scheme for string identification
by: Indranil Ghosh Ray, et al.
Published: (2018)
by: Indranil Ghosh Ray, et al.
Published: (2018)
Loading…
Multimedia telecommunications / edited by Bill Whyte.
Published: (1997)
Published: (1997)
Loading…
What is computer science? : an information security perspective / Daniel Page, Nigel Smart.
by: Page, Daniel Stephen, et al.
Published: (2014)
by: Page, Daniel Stephen, et al.
Published: (2014)
Loading…
Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998 / Johannes Buchmann ... [et al.], editors.
Published: (2000)
Published: (2000)
Similar Items
-
Multimedia watermaking techniques and applications / editors-in-chief and authors, Borko Furht, Darko Kirovski.
Published: (2006) -
Multimedia encryption and watermarking / Borko Furht, Edin Muharemagic and Daniel Socek.
by: Furht, Borko
Published: (2005) -
Multimedia content encryption : techniques and applications / Shiguo Lian.
by: Lian, Shiguo
Published: (2009) -
Multimedia information hiding technologies and methodologies for controlling data Kazuhiro Kondo, editor.
Published: (2013) -
Image encryption a communication perspective / Fathi E. Abd El-Samie ... [et al].
Published: (2014)