References
- Hu, R.Q., Yi Qian, Hsiao-Hwa Chen and Jamalipour, A., "Recent progress in machine-to- machine communications," IEEE Communications Magazine, vol. 49, no. 4, pp. 24-26, Apr. 2011.
- Du Jiang and Chao ShiWei, "A study of information security for M2M of IOT," in Proc. of 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 3, pp. 576-579, pp. 20-22 Aug. 2010.
- Chin-Feng Lai, Yueh-Min Huang, Jiann-Liang Chen, Wen Ji and Min Chen, "Design and integration of the OpenCore based mobile TV framework for DVB-H/ T wireless network," Jounal of ACM Multimedia Systems, 2010.
- L. Zhou, X. Wang, W. Tu, G. Muntean and B. Geller, "Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks," IEEE Journal on Selected Areas in Communications, vol 28, no. 3, pp. 409-419, 2010.
- B.Sklar, "Digital communications: Fundamentals and applications," pp. 890-893. 2001.
- Robert H. Morelos-Zaragoza, "The art of error correcting coding," pp. 2-185, 2006.
- C. Berrou, A. Glavieux and P. Thitimajshima, "Near shannon limit error-correcting coding and decoding: Turbo-codes," in Proc. of IEEE International Conference on Communications(ICC'93), pp. 1064-1070, May. 1993.
- S.-Y. Chung, G. D. Forney, Jr., T. J. Richardson and R. Urbanke, "On the design of low-density parity-check codes within 0.0045 dB of the Shannon Limit," IEEE Communication Letter, vol. 5, no. 2, pp. 58-60, Feb. 2001.
- A. Huebner and R. Jordan, "On higher order permutors for serially concatenated convolutional codes," IEEE Transactions on Information Theory, pp. 1238-1248, 2006.
- D.J.C. MacKay, "Information theory, inference, and learning algorithms," Cambridge University Press, pp. 8-12, 2003.
- Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, "Information hiding :A survey," Proeeding of the IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999. https://doi.org/10.1109/5.771065
- N. Jiping, Z. Yongchuan, H. Zhihua, and Y. Zuqiao, "A digital image scrambling method based on AES and error-correcting code," in Proc. of CSSE , vol.3, pp. 677-680, 2008.
- Lixin, D., "A new approach of data hiding within speech based on hash and Hilbert transform," in Proc. of ICSNC, 2006.
- S. Benedetto, D. Divsalar, G. Montorsi, and F. Pollara, "Serial concatenation of interleaved codes: Performance analysis, design, and iterative decoding," Transactions on Information Theory, pp. 909-926, 1998.
- Mohamed El-Hadedy, Danilo Gligoroski , Svein J. Knapskog and Einar Johan Aas, "Low area FPGA and ASIC implementations of the hash function "Blue Midnight Wish-256,"," in Proc. of International Conference on Computer Engineering & Systems, pp. 10-14, 2009.
Cited by
- RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN vol.2016, pp.None, 2012, https://doi.org/10.1155/2016/2098680