-
1
-
-
0036697706
-
New voice over Internet protocol technique with hierarchical data security protection
-
Aug
-
J.-l. Guo, J.-C. Yen and H.-F. Pai, "New voice over Internet protocol technique with hierarchical data security protection," IEE Proc.-Vis. Image Signal Process., vol. 149, no. 4, Aug. 2002, pp. 237-243.
-
(2002)
IEE Proc.-Vis. Image Signal Process
, vol.149
, Issue.4
, pp. 237-243
-
-
Guo, J.-L.1
Yen, J.-C.2
Pai, H.-F.3
-
2
-
-
33645526435
-
Cryptanalysis of a data security protection scheme for VoIP
-
Feb
-
C. Li, S. Li, D. Zhang and G. Chen. "Cryptanalysis of a data security protection scheme for VoIP," IEE Proc.-Vis. Image Signal Process., vol. 153, no. 1, Feb. 2006, pp. 1-10.
-
(2006)
IEE Proc.-Vis. Image Signal Process
, vol.153
, Issue.1
, pp. 1-10
-
-
Li, C.1
Li, S.2
Zhang, D.3
Chen, G.4
-
3
-
-
29244445112
-
A more secure chaotic cryptographic scheme based on dynamic look-up table
-
Oct
-
K. W. Wong, K. P. Man, S. Li, and X. Liao, "A more secure chaotic cryptographic scheme based on dynamic look-up table," Circuits, Systems and Signal Processing, vol. 24, no. 5, Oct. 2005, pp. 571-584.
-
(2005)
Circuits, Systems and Signal Processing
, vol.24
, Issue.5
, pp. 571-584
-
-
Wong, K.W.1
Man, K.P.2
Li, S.3
Liao, X.4
-
4
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
5
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, no. 177, 1987, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
6
-
-
0042786512
-
Cryptography with chaos
-
Mar
-
M. S. Baptista, "Cryptography with chaos," Phys. Lett. A, vol. 240, Mar. 1998, pp. 50-54.
-
(1998)
Phys. Lett. A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
7
-
-
0037053849
-
A fast chaotic cryptography scheme with dynamic look-up table
-
June
-
K. W. Wong, "A fast chaotic cryptography scheme with dynamic look-up table," Phys. Lett. A, vol. 298, June 2002, pp. 238-242.
-
(2002)
Phys. Lett. A
, vol.298
, pp. 238-242
-
-
Wong, K.W.1
-
8
-
-
0035881532
-
Modified chaotic cryptographic method
-
Aug
-
W. K. Wong, L. P. Lee and K. W. Wong, "Modified chaotic cryptographic method," Computer Physics Communication, vol. 138, no. 3, Aug. 2001, pp. 234-236.
-
(2001)
Computer Physics Communication
, vol.138
, Issue.3
, pp. 234-236
-
-
Wong, W.K.1
Lee, L.P.2
Wong, K.W.3
-
9
-
-
0037424907
-
A chaotic cryptographic scheme for generating short ciphertext
-
Apr
-
K. W. Wong, S. W. Ho and C. K. Yung, "A chaotic cryptographic scheme for generating short ciphertext," Phys. Lett. A, vol. 310, Apr. 2003, pp. 67-73.
-
(2003)
Phys. Lett. A
, vol.310
, pp. 67-73
-
-
Wong, K.W.1
Ho, S.W.2
Yung, C.K.3
-
10
-
-
0037454786
-
Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems
-
Jan
-
S. Li, X. Mou, Z. Ji, J. Zhang and Y. Cai, "Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems," Phys. Lett. A, vol. 307, no. 1, Jan. 2003, pp. 22-28.
-
(2003)
Phys. Lett. A
, vol.307
, Issue.1
, pp. 22-28
-
-
Li, S.1
Mou, X.2
Ji, Z.3
Zhang, J.4
Cai, Y.5
-
11
-
-
7644243295
-
Baptista-type chaotic cryptosystems: Problems and countermeasures
-
Nov
-
S. Li, G. Chen, K. W. Wong, X. Mou and Y. Cai, "Baptista-type chaotic cryptosystems: Problems and countermeasures," Phys. Lett. A, vol. 332, no. 5-6, Nov. 2004, pp. 368-375.
-
(2004)
Phys. Lett. A
, vol.332
, Issue.5-6
, pp. 368-375
-
-
Li, S.1
Chen, G.2
Wong, K.W.3
Mou, X.4
Cai, Y.5
-
12
-
-
50249134689
-
-
OpenH323 project, available online at
-
OpenH323 project, available online at http://www.openh323.org/
-
-
-
|