-
2
-
-
0036132948
-
An overview of the JPEG 2000 still image compression standard
-
M. Rabbani and R. Joshi, "An overview of the JPEG 2000 still image compression standard," Signal Process.: image Commun., vol. 17, pp. 3-48, 2002.
-
(2002)
Signal Process.: Image Commun
, vol.17
, pp. 3-48
-
-
Rabbani, M.1
Joshi, R.2
-
3
-
-
34648834174
-
-
Online, Available
-
ITU-T Rec. T.800, ISO 154447 [Online]. Available: http://www.jpeg.org
-
, vol.ISO 154447
, Issue.T.800
-
-
Rec, I.T.U.-T.1
-
5
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
R. S. Sandhu, "Cryptographic implementation of a tree hierarchy for access control," Inform. Process. Lett., vol. 27, no. 2, pp. 95-98, 1988.
-
(1988)
Inform. Process. Lett
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
6
-
-
0038223809
-
Access controls in object-oriented database systems - Some approaches and issues
-
E. Bertino, S. Jajodia, and P. Samarati, "Access controls in object-oriented database systems - Some approaches and issues," Adv. Database Syst., vol. 759, pp. 17-44, 1993.
-
(1993)
Adv. Database Syst
, vol.759
, pp. 17-44
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
7
-
-
0028513932
-
Access control: Principle and practice
-
R. S. Sandhu and P. Samarati, "Access control: Principle and practice," IEEE Commun. Mag., vol. 32, no. 9, pp. 40-48, 1994.
-
(1994)
IEEE Commun. Mag
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
8
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy," ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 239-248, 1983.
-
(1983)
ACM Trans. Comput. Syst
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
9
-
-
84894043862
-
Flexible access control with master keys
-
Proc. Advances in Cryptology-Crypto'89
-
G. C. Chick and S. E. Tavares, "Flexible access control with master keys," in Proc. Advances in Cryptology-Crypto'89, 1990, vol. 435, LNCS, pp. 316-322.
-
(1990)
LNCS
, vol.435
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
10
-
-
0000954459
-
A cryptographic key generation scheme for multi-level data security
-
L. Harn and H. Y. Lin, "A cryptographic key generation scheme for multi-level data security," J. Comput. Secur., vol. 9, no. 6, pp. 539-546, 1990.
-
(1990)
J. Comput. Secur
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
11
-
-
0022115074
-
An optimal algorithm, for assigning cryptographic keys to access control in a hierarchy
-
S.J. MacKinnon, P. D. Taylor, H. Meijer, and S. G. Akl, "An optimal algorithm, for assigning cryptographic keys to access control in a hierarchy," IEEE Trans. Comput., vol. C-34, no. 9, pp. 797-802, 1985.
-
(1985)
IEEE Trans. Comput
, vol.C-34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
12
-
-
0242697685
-
Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme
-
K. Ohta, T. Okamoto, and K. Koyama, "Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme," in. Proc. Advances in Cryptology-Eurpcrypt'90, 1991, vol. 473, pp. 316-322.
-
(1991)
Proc. Advances in Cryptology-Eurpcrypt'90
, vol.473
, pp. 316-322
-
-
Ohta, K.1
Okamoto, T.2
Koyama, K.3
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 637-647, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 637-647
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
0035765561
-
Authentication and access control in the JPEG 2000 compression domain
-
R. Grosbois, P. Gerbelot, and T. Ebrahimi, "Authentication and access control in the JPEG 2000 compression domain," in Proc. SPIE 46th Annu. Meeting: Applications of Digital Image Processing XXIV, 2001, vol. 4472, pp. 95-104.
-
(2001)
Proc. SPIE 46th Annu. Meeting: Applications of Digital Image Processing XXIV
, vol.4472
, pp. 95-104
-
-
Grosbois, R.1
Gerbelot, P.2
Ebrahimi, T.3
-
15
-
-
0344666670
-
Secure scalable streaming and secure transcoding with JPEG-2000
-
S. Wee and J. Apostolopoulos, "Secure scalable streaming and secure transcoding with JPEG-2000," in Proc. IEEE Int. Conf. Image. Process., 2003, vol. 1, pp. 14-17.
-
(2003)
Proc. IEEE Int. Conf. Image. Process
, vol.1
, pp. 14-17
-
-
Wee, S.1
Apostolopoulos, J.2
-
16
-
-
20444487007
-
Progressive protection of JPEG 2000 code-streams
-
Y. Wu, D. Ma, and R. H. Deng, "Progressive protection of JPEG 2000 code-streams," in Proc. IEEE Int. Conf. Image Processing, 2004, pp. 3439-3442.
-
(2004)
Proc. IEEE Int. Conf. Image Processing
, pp. 3439-3442
-
-
Wu, Y.1
Ma, D.2
Deng, R.H.3
-
18
-
-
33749053820
-
An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations
-
Jan
-
B. B. Zhu, Y. Yang, and S. Li, "An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations," in Proc. IEEE Consumer Communications and Networking Conference (CCNC), Jan. 2006, vol. 2, pp. 1124-1128.
-
(2006)
Proc. IEEE Consumer Communications and Networking Conference (CCNC)
, vol.2
, pp. 1124-1128
-
-
Zhu, B.B.1
Yang, Y.2
Li, S.3
-
19
-
-
33745406613
-
Information Technology-JPEG 2000 Image Coding System - Part 9: Interactivity Tools, APIs and Protocols
-
ISO/IEC FDIS 15444-9: Jul. 1
-
ISO/IEC FDIS 15444-9: Information Technology-JPEG 2000 Image Coding System - Part 9: Interactivity Tools, APIs and Protocols Jul. 1, 2004.
-
(2004)
-
-
-
20
-
-
0000675337
-
Superdistribution: The concept and the architecture
-
Jul, Online, Available
-
R. Mori and M. Kawahara, "Superdistribution: The concept and the architecture," Trans. IEIEC vol. E73, no. 7, Jul. 1990 [Online]. Available: http://www.virtualschool.edu/mon/ElectronicProperty/MoriSuperdist. html
-
(1990)
Trans. IEIEC
, vol.E73
, Issue.7
-
-
Mori, R.1
Kawahara, M.2
-
21
-
-
0027699087
-
Lattice-based access control models
-
R. S. Sandhu, "Lattice-based access control models," IEEE Computer, vol. 26, no. 11, pp. 9-19, 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
22
-
-
0242456749
-
A cryptographic solution to implement access control in. a hierarchy and more
-
I. Ray, I. Ray, and N. Narasimhamurthi, "A cryptographic solution to implement access control in. a hierarchy and more," in Proc. 7th ACM Symp. Access Control Models and Technologies, 2002, pp. 65-73.
-
(2002)
Proc. 7th ACM Symp. Access Control Models and Technologies
, pp. 65-73
-
-
Ray, I.1
Ray, I.2
Narasimhamurthi, N.3
-
23
-
-
0003629991
-
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology, Secure Hash Standard (SHS) FIPS Publ. 180-1, 1995.
-
(1995)
Secure Hash Standard (SHS) FIPS Publ
, pp. 180-181
-
-
-
25
-
-
34648816306
-
-
R. L. Rivest, RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992.
-
R. L. Rivest, RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992.
-
-
-
|