-
1
-
-
0035279159
-
Overview of fine granularity scalability in MPEG-4 video standard
-
Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Transactions on Circuits and Systems for Video Technology 11(3), 301-317 (2001)
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.3
, pp. 301-317
-
-
Li, W.1
-
2
-
-
0034315180
-
The JPEG2000 still image coding system: An overview
-
Christopoulos, C., Skodras, A., Ebrahimi, T.: The JPEG2000 still image coding system: An overview. IEEE Transactions on Consumer Electronics 46(4), 1103-1127 (2000)
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.4
, pp. 1103-1127
-
-
Christopoulos, C.1
Skodras, A.2
Ebrahimi, T.3
-
3
-
-
11244344451
-
An efficient key scheme for layered access control of MPEG-4 FGS video
-
Zhu, B., Feng, S., Li, S.: An efficient key scheme for layered access control of MPEG-4 FGS video. In: Proceedings of the 2004 IEEE International Conference on Multimedia and Expo., vol. 1, pp. 443-446 (2004)
-
(2004)
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo.
, vol.1
, pp. 443-446
-
-
Zhu, B.1
Feng, S.2
Li, S.3
-
4
-
-
69949191257
-
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images
-
Hashimoto, N., Imaizumi, S., Fujiyoshi, M., Kiya, H.: Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. In: Proceedings of the 2008 IEEE International Conference on Image Processing, pp. 3116-3119 (2008)
-
(2008)
Proceedings of the 2008 IEEE International Conference on Image Processing
, pp. 3116-3119
-
-
Hashimoto, N.1
Imaizumi, S.2
Fujiyoshi, M.3
Kiya, H.4
-
5
-
-
48149093649
-
Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control
-
Imaizumi, S., Fujiyoshi, M., Abe, Y., Kiya, H.: Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control. In: Proceedings of the 2007 IEEE International Conference on Image Processing, vol. 2, pp. 137-140 (2007)
-
(2007)
Proceedings of the 2007 IEEE International Conference on Image Processing
, vol.2
, pp. 137-140
-
-
Imaizumi, S.1
Fujiyoshi, M.2
Abe, Y.3
Kiya, H.4
-
6
-
-
33749592767
-
Generalized hierarchical encryption of JPEG 2000 codestreams for access control
-
Imaizumi, S., Watanabe, O., Fujiyoshi, M., Kiya, H.: Generalized hierarchical encryption of JPEG 2000 codestreams for access control. In: Proceedings of the 2005 IEEE International Conference on Image Processing, vol. 2, pp. 1094-1097 (2005)
-
(2005)
Proceedings of the 2005 IEEE International Conference on Image Processing
, vol.2
, pp. 1094-1097
-
-
Imaizumi, S.1
Watanabe, O.2
Fujiyoshi, M.3
Kiya, H.4
-
7
-
-
77958487817
-
Constructing key assignment schemes from chain partitions
-
Royal Holloway, University of London
-
Crampton, J., Daud, R., Martin, K.: Constructing key assignment schemes from chain partitions. Technical Report RHUL-MA-2010-10, Royal Holloway, University of London (2010), http://www.ma.rhul.ac.uk/static/techrep/2010/RHUL- MA-2010-10.pdf
-
(2010)
Technical Report RHUL-MA-2010-10
-
-
Crampton, J.1
Daud, R.2
Martin, K.3
-
8
-
-
33947630349
-
On key assignment for hierarchical access control
-
Crampton, J., Martin, K., Wild, P.: On key assignment for hierarchical access control. In: Proceedings of 19th Computer Security Foundations Workshop, pp. 98-111 (2006)
-
(2006)
Proceedings of 19th Computer Security Foundations Workshop
, pp. 98-111
-
-
Crampton, J.1
Martin, K.2
Wild, P.3
-
11
-
-
0003400251
-
Secure computer systems: Unified exposition and Multics interpretation
-
Mitre Corporation, Bedford, Massachusetts
-
Bell, D., LaPadula, L.: Secure computer systems: Unified exposition and Multics interpretation. Technical Report MTR-2997, Mitre Corporation, Bedford, Massachusetts (1976)
-
(1976)
Technical Report MTR-2997
-
-
Bell, D.1
LaPadula, L.2
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D.: A lattice model of secure information flow. Communications of the ACM 19(5), 236-243 (1976)
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
13
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and efficient key management for access hierarchies. ACM Transactions on Information and System Security 12(3), 1-43 (2009)
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.3
, pp. 1-43
-
-
Atallah, M.1
Blanton, M.2
Fazio, N.3
Frikken, K.4
-
14
-
-
0001387789
-
A decomposition theorem for partially ordered sets
-
Dilworth, R.: A decomposition theorem for partially ordered sets. Annals of Mathematics 51, 161-166 (1950)
-
(1950)
Annals of Mathematics
, vol.51
, pp. 161-166
-
-
Dilworth, R.1
-
15
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl, S., Taylor, P.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1(3), 239-248 (1983)
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
16
-
-
33748049115
-
Key management for non-tree access hierarchies
-
Atallah, M., Blanton, M., Frikken, K.: Key management for non-tree access hierarchies. In: Proceedings of 11th ACM Symposium on Access Control Models and Technologies, pp. 11-18 (2006)
-
(2006)
Proceedings of 11th ACM Symposium on Access Control Models and Technologies
, pp. 11-18
-
-
Atallah, M.1
Blanton, M.2
Frikken, K.3
-
17
-
-
34748839039
-
Efficient techniques for realizing geo-spatial access control
-
Atallah, M., Blanton, M., Frikken, K.: Efficient techniques for realizing geo-spatial access control. In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, pp. 82-92 (2007)
-
(2007)
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security
, pp. 82-92
-
-
Atallah, M.1
Blanton, M.2
Frikken, K.3
|