-
2
-
-
0002015048
-
Visual cryptography for general access structures
-
September
-
G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson. Visual cryptography for general access structures. Information and Computation, 129(2):86-106, September 1996.
-
(1996)
Information and Computation
, vol.129
, Issue.2
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
Santis, A.D.3
Stinson, D.R.4
-
4
-
-
3042520226
-
Report on a working session on security in wireless ad hoc networks
-
November
-
L. Buttyàn and J.-P. Hubaux. Report on a working session on security in wireless ad hoc networks. ACM Mobile Computing and Communications Review, 6(4): 1-17, November 2002.
-
(2002)
ACM Mobile Computing and Communications Review
, vol.6
, Issue.4
, pp. 1-17
-
-
Buttyàn, L.1
Hubaux, J.-P.2
-
5
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
March
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proc. IEEE INFOCOM, March 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
6
-
-
14344263555
-
Multimedia streaming in large-scale sensor networks with mobile swarms
-
December
-
M. Gerla and K. Xu. Multimedia streaming in large-scale sensor networks with mobile swarms. ACM SIGMOD Record, 32(32):72-76, December 2003.
-
(2003)
ACM SIGMOD Record
, vol.32
, Issue.32
, pp. 72-76
-
-
Gerla, M.1
Xu, K.2
-
7
-
-
10044234541
-
Image size invariant visual cryptography
-
October
-
R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, E82-A(10):2172-2177, October 1999.
-
(1999)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
, vol.E82-A
, Issue.10
, pp. 2172-2177
-
-
Ito, R.1
Kuwakado, H.2
Tanaka, H.3
-
8
-
-
0141741345
-
Secret image sharing with capability of share data reduction
-
August
-
C. C. Lin and W. H. Tsai. Secret image sharing with capability of share data reduction. Optical Engineering., Bellingham (USA), 42(8):2340-2345, August 2003.
-
(2003)
Optical Engineering., Bellingham (USA)
, vol.42
, Issue.8
, pp. 2340-2345
-
-
Lin, C.C.1
Tsai, W.H.2
-
9
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
Jet Propulsion Lab
-
R. J. McEliece. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report 42-44, Jet Propulsion Lab, 1978. pages 114-116.
-
(1978)
DSN Progress Report
, vol.42
, Issue.44
, pp. 114-116
-
-
McEliece, R.J.1
-
11
-
-
0037356065
-
Distributed source coding using syndromes (discus): Design and construction
-
March
-
S. Pradhan and K. Ramchandran. Distributed source coding using syndromes (discus): Design and construction. IEEE Trans. Information Theory, 49:626-643, March 2003.
-
(2003)
IEEE Trans. Information Theory
, vol.49
, pp. 626-643
-
-
Pradhan, S.1
Ramchandran, K.2
-
12
-
-
0032116538
-
Comparison of MPEG encryption algorithms
-
L. Qiao and K. Nahrstedt. Comparison of MPEG encryption algorithms. Computers and Graphics, 22(4):437-448, 1998.
-
(1998)
Computers and Graphics
, vol.22
, Issue.4
, pp. 437-448
-
-
Qiao, L.1
Nahrstedt, K.2
-
13
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. In Communications of the ACM22, number 11, pages 612-613, November 1979.
-
(1979)
Communications of the ACM22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
14
-
-
2642554156
-
Design of slepian-wolf codes by channel code partitioning
-
March
-
V. Stankovic, A. Liveris, Z. Xiong, and C. Georghiades. Design of slepian-wolf codes by channel code partitioning. In Proc. IEEE Data Compression Conference, pages 302-311, March 2004.
-
(2004)
Proc. IEEE Data Compression Conference
, pp. 302-311
-
-
Stankovic, V.1
Liveris, A.2
Xiong, Z.3
Georghiades, C.4
|