1 |
Michael O'neil, "Unix System in a Large Enterprise Environment-Axent Esm", SANS Institute Information Security Reading Room, June 22, 2001.
|
2 |
Mara C. FERNANDEZ, Ernestina MENASALVAS, Oscar MARBAN, Jose MM PENA, Socorro MILLAN, "MINIMAL DECISION RULES BASED ON THE APRIORI ALGORITHM", Int. J. Appl. Math Computer. Sci Vol.11, No.3, pp. 681-704, 2001.
|
3 |
W.ahn, "EAR: An Energy-Aware Block Reallocation Framework for Energy Efficiency", Proc. of ICCS - LNCS 4490, pp. 941-948, 2007.
|
4 |
R. Chandramouli, S. Bapatla, and K. Subbalakshmi, "Battery Power-Aware Encryption", ACM Tr. Info and System Security, Vol 9 No. 2 pp. 162-180, 2006.
DOI
|
5 |
P. Prasithsanaree and P. Krishnamurthy, "on a Framework for Energy-Efficient Security Protocols in Wireless Networks", Computer Communcations, Vol. 27, pp. 1716-1729, 2004.
|
6 |
W. Zeng, H. Yu, and C. Lin, Multimedia Security Technologies for Digital Rights Management, Academic Press, 2006.
|
7 |
T. Maples and G. Spanos, "Performance Study of Selective Encryption Scheme for the Security of Networked Real-Time Video", Proc. of ICCCN, pp. 2-10, 1995.
|
8 |
F. Liu and H. Koenig. "A Novel Encryption Algorithm for High Resolution Video", Proc. of NOSSDAV, pp. 69-74, 2005.
|
9 |
B. Bhargava, C. Shi, and S. Wang, "MPEG Video Encryption Algorithms", Multimedia Tools and Applications, Vol. 24, pp. 57-79, 2004.
DOI
ScienceOn
|