1 |
Hu, R.Q., Yi Qian, Hsiao-Hwa Chen and Jamalipour, A., "Recent progress in machine-to- machine communications," IEEE Communications Magazine, vol. 49, no. 4, pp. 24-26, Apr. 2011.
|
2 |
Du Jiang and Chao ShiWei, "A study of information security for M2M of IOT," in Proc. of 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 3, pp. 576-579, pp. 20-22 Aug. 2010.
|
3 |
Chin-Feng Lai, Yueh-Min Huang, Jiann-Liang Chen, Wen Ji and Min Chen, "Design and integration of the OpenCore based mobile TV framework for DVB-H/ T wireless network," Jounal of ACM Multimedia Systems, 2010.
|
4 |
L. Zhou, X. Wang, W. Tu, G. Muntean and B. Geller, "Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks," IEEE Journal on Selected Areas in Communications, vol 28, no. 3, pp. 409-419, 2010.
|
5 |
B.Sklar, "Digital communications: Fundamentals and applications," pp. 890-893. 2001.
|
6 |
Robert H. Morelos-Zaragoza, "The art of error correcting coding," pp. 2-185, 2006.
|
7 |
C. Berrou, A. Glavieux and P. Thitimajshima, "Near shannon limit error-correcting coding and decoding: Turbo-codes," in Proc. of IEEE International Conference on Communications(ICC'93), pp. 1064-1070, May. 1993.
|
8 |
S.-Y. Chung, G. D. Forney, Jr., T. J. Richardson and R. Urbanke, "On the design of low-density parity-check codes within 0.0045 dB of the Shannon Limit," IEEE Communication Letter, vol. 5, no. 2, pp. 58-60, Feb. 2001.
|
9 |
A. Huebner and R. Jordan, "On higher order permutors for serially concatenated convolutional codes," IEEE Transactions on Information Theory, pp. 1238-1248, 2006.
|
10 |
D.J.C. MacKay, "Information theory, inference, and learning algorithms," Cambridge University Press, pp. 8-12, 2003.
|
11 |
Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, "Information hiding :A survey," Proeeding of the IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999.
DOI
ScienceOn
|
12 |
N. Jiping, Z. Yongchuan, H. Zhihua, and Y. Zuqiao, "A digital image scrambling method based on AES and error-correcting code," in Proc. of CSSE , vol.3, pp. 677-680, 2008.
|
13 |
Lixin, D., "A new approach of data hiding within speech based on hash and Hilbert transform," in Proc. of ICSNC, 2006.
|
14 |
S. Benedetto, D. Divsalar, G. Montorsi, and F. Pollara, "Serial concatenation of interleaved codes: Performance analysis, design, and iterative decoding," Transactions on Information Theory, pp. 909-926, 1998.
|
15 |
Mohamed El-Hadedy, Danilo Gligoroski , Svein J. Knapskog and Einar Johan Aas, "Low area FPGA and ASIC implementations of the hash function "Blue Midnight Wish-256,"," in Proc. of International Conference on Computer Engineering & Systems, pp. 10-14, 2009.
|