1 |
ISO/IEC 23001-7:2016, Part 7: Common encryption in ISO base media file format files In Information technology - MPEG systems technologies Retrieved from https://www.iso.org/standard/68042.html
|
2 |
Alka Vishwa and Farookh Hussain, "A blockchain based approach for multimedia privacy protection and provenance," In 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp.1941-1945, Nov. 2018.
|
3 |
R. Wang, J. He, C. Liu, Q. Li, W. Tsai, and E. Deng, "A privacy-aware PKI system based on permissioned blockchains," In 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), pp.928-931, Nov. 2018.
|
4 |
A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, "Medrec: Using blockchain for medical data access and permission management," In 2016 2nd International Conference on Open and Big Data (OBD), pp.25-30, Aug. 2016.
|
5 |
X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla, "Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability," In 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp.468-477, May 2017.
|
6 |
P. Patila, P. Narayankar, N. D G and M. S M, "A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish," Procedia Computer Science, Vol.78, pp.617-624, 2016.
DOI
|
7 |
Microsoft Stream Video Delivery and Network Overview [Internet], https://docs.microsoft.com/en-us/stream/network-overview
|
8 |
B. Barnes, M. Thomson, A. Pironti, and A. Langley, "Deprecating secure sockets layer version 3.0", RFC 7568, doi: 10.17487/RFC7568, June 2015, .
DOI
|
9 |
D. C. Latham, "Department of defense trusted computer system evaluation criteria. Department of Defense," 1986.
|
10 |
Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An overview of blockchain technology: Architecture, consensus, and future trends," 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, pp.557-564, 2017.
|
11 |
G. Zyskind, O. Nathan, and A. Pentland, "Decentralizing privacy: Using blockchain to protect personal data," In 2015 IEEE Security and Privacy Workshops, pp.180-184, May 2015.
|