-
1
-
-
0034245407
-
Image encryption for secure Internet multimedia applications [J]
-
Dang P P, Chan P M. Image encryption for secure Internet multimedia applications [J]. IEEE Transactions on Consumer Electronics, 2000, 46(3): 395-443.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.3
, pp. 395-443
-
-
Dang, P.P.1
Chan, P.M.2
-
2
-
-
74849093254
-
-
Guodeng Feng. Principle and network security technology[M].Beijing: Science Press, 2003.
-
Guodeng Feng. Principle and network security technology[M].Beijing: Science Press, 2003.
-
-
-
-
4
-
-
0031351370
-
-
Fridrich J.Image Encryption Based on Chaotic Maps.IEEE,1997,1105-1110
-
Fridrich J.Image Encryption Based on Chaotic Maps.IEEE,1997,1105-1110
-
-
-
-
5
-
-
85143190748
-
-
Sobhy M I, Shehata A-E R. Methods of Attacking Chaotic Encryption and Countermeasures. In:IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001, 2: 1001-1004
-
Sobhy M I, Shehata A-E R. Methods of Attacking Chaotic Encryption and Countermeasures. In:IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001, 2: 1001-1004
-
-
-
-
7
-
-
0036867992
-
-
Shuisheng-Qiu, Yangfeng-Chen, WuMin. Discussion on Chaotic Secure Communication and New Schemes of Chaotic Encryption[J]. Journal of South China University of Technology(Natural Science Edition), 2002, 30 (11): 75-80
-
Shuisheng-Qiu, Yangfeng-Chen, WuMin. Discussion on Chaotic Secure Communication and New Schemes of Chaotic Encryption[J]. Journal of South China University of Technology(Natural Science Edition), 2002, 30 (11): 75-80
-
-
-
-
8
-
-
74849112874
-
Multimedia network information security technology[M]
-
Wuhan Publishing House
-
Lina Wang. Multimedia network information security technology[M]. Wuhan Hubei: Wuhan Publishing House, 2003, 27-33
-
(2003)
Wuhan Hubei
, pp. 27-33
-
-
Wang, L.1
-
9
-
-
74849089741
-
Analysis and Research of DES Encryption Algorithm[J]
-
Li Lv, jia Zhao. Analysis and Research of DES Encryption Algorithm[J]. Journal of Nanchang Institute of Technology, 2006,12(5): 28-31
-
(2006)
Journal of Nanchang Institute of Technology
, vol.12
, Issue.5
, pp. 28-31
-
-
Lv, L.1
jia Zhao2
-
10
-
-
1342306864
-
A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps[J]
-
Chen Guanrong, Mao Yaobin, Charles K. A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps[J]. Chaos,Solitons and Fractals, 2004, 3(21): 749-761.
-
(2004)
Chaos,Solitons and Fractals
, vol.3
, Issue.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Charles, K.3
-
11
-
-
74849104140
-
-
Yaoqun Xu, jian Liu, honglei Qin. Plane tent map chaotic sequence analysis of binary [J]. Harbin University Business Journal (Natural Science), 2003.2, 19(1): 47-51.
-
Yaoqun Xu, jian Liu, honglei Qin. Plane tent map chaotic sequence analysis of binary [J]. Harbin University Business Journal (Natural Science), 2003.2, 19(1): 47-51.
-
-
-
-
13
-
-
1342306864
-
A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps[J]
-
Chen Guanrong, Mao Yaobin, Charles K. A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps[J]. Chaos, Solitons and Fractals, 2004, 3(21): 749-761.
-
(2004)
Chaos, Solitons and Fractals
, vol.3
, Issue.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Charles, K.3
-
14
-
-
74849116901
-
-
Stallings W.Cryptography and Network Security Principles and Practices, Fourth Edition [M]. Prentice Hall
-
Stallings W.Cryptography and Network Security Principles and Practices, Fourth Edition [M]. Prentice Hall
-
-
-
-
15
-
-
74849138538
-
-
beijing: Tsinghua University Press
-
dengguo Feng. Analysis of password [M]. beijing: Tsinghua University Press, 2000:54-83
-
(2000)
Analysis of password [M]
, pp. 54-83
-
-
dengguo Feng1
|