-
1
-
-
79951745086
-
Video streaming security: window-based hash chain signature combines with redundancy code - youtube scenario as an internet case study
-
In
-
Abd-Elrahman E, Abid M, Afifi H (2010) Video streaming security: window-based hash chain signature combines with redundancy code - youtube scenario as an internet case study. In: 2010 IEEE International symposium on multimedia (ISM), pp 33–40. doi:10.1109/ISM.2010.15
-
(2010)
2010 IEEE International symposium on multimedia (ISM)
, pp. 33-40
-
-
Abd-Elrahman, E.1
Abid, M.2
Afifi, H.3
-
2
-
-
84948661313
-
Qos-adaptive service configuration framework for cloud-assisted video surveillance systems
-
Alamri A, Hossain MS, Almogren A, Hassan MM, Alnafjan K, Zakariah M, Seyam L, Alghamdi A (2016) Qos-adaptive service configuration framework for cloud-assisted video surveillance systems. Multimed Tools Appl 75(21):13,333–13,348. doi:10.1007/s11042-015-3074-7
-
(2016)
Multimed Tools Appl
, vol.75
, Issue.21
, pp. 13,333-13,348
-
-
Alamri, A.1
Hossain, M.S.2
Almogren, A.3
Hassan, M.M.4
Alnafjan, K.5
Zakariah, M.6
Seyam, L.7
Alghamdi, A.8
-
5
-
-
84984815904
-
Internet of surveillance: a cloud supported large-scale wireless surveillance system
-
Alsmirat MA, Jararweh Y, Obaidat I, Gupta BB (2016) Internet of surveillance: a cloud supported large-scale wireless surveillance system. J Supercomput:1–20. doi:10.1007/s11227-016-1857-x
-
(2016)
J Supercomput
, pp. 1-20
-
-
Alsmirat, M.A.1
Jararweh, Y.2
Obaidat, I.3
Gupta, B.B.4
-
6
-
-
33646909480
-
-
Request for Comments, IETF
-
Baugher M, McGrew D, Naslund M, Carrara E, Norrman K (2004) Rfc 3711: The secure real-time transport protocol (srtp). Request for Comments, IETF
-
(2004)
Rfc 3711: The secure real-time transport protocol (srtp)
-
-
Baugher, M.1
McGrew, D.2
Naslund, M.3
Carrara, E.4
Norrman, K.5
-
7
-
-
84937604282
-
Dynamic reconfigurable encryption and decryption with chaos/m-sequence mapping algorithm for secure h.264/avc video streaming over ocdma passive optical network
-
Chang YT, Lin YC (2016) Dynamic reconfigurable encryption and decryption with chaos/m-sequence mapping algorithm for secure h.264/avc video streaming over ocdma passive optical network. Multimed Tools Appl 75(16):9837–9859. doi:10.1007/s11042-015-2784-1
-
(2016)
Multimed Tools Appl
, vol.75
, Issue.16
, pp. 9837-9859
-
-
Chang, Y.T.1
Lin, Y.C.2
-
8
-
-
85031941848
-
-
Cmu/mit image set. [Online; accessed Nov-2015]
-
Cmu/mit image set. http://vasc.ri.cmu.edu/idb/html/face/frontal_images/ [Online; accessed Nov-2015]
-
-
-
-
9
-
-
84919901990
-
-
Aes proposal, Rijndael
-
Daemen J, Rijmen V (1999) Aes proposal: Rijndael
-
(1999)
Rijmen V
-
-
Daemen, J.1
-
11
-
-
37149018890
-
A survey of lightweight-cryptography implementations
-
Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L (2007) A survey of lightweight-cryptography implementations. IEEE Des Test Comput 24(6):522–533. doi:10.1109/MDT.2007.178
-
(2007)
IEEE Des Test Comput
, vol.24
, Issue.6
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
Paar, C.3
Poschmann, A.4
Uhsadel, L.5
-
12
-
-
48349122918
-
Enhancing wireless video streaming using lightweight approximate authentication
-
Fehér G, Oláh I (2008) Enhancing wireless video streaming using lightweight approximate authentication. Multimed Syst 14(3):167–177. doi:10.1007/s00530-008-0122-4
-
(2008)
Multimed Syst
, vol.14
, Issue.3
, pp. 167-177
-
-
Fehér, G.1
Oláh, I.2
-
14
-
-
84963679961
-
Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment
-
Gupta BB, Badve OP (2016) Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment. Neural Comput Appl:1–28. doi:10.1007/s00521-016-2317-5
-
(2016)
Neural Comput Appl
, pp. 1-28
-
-
Gupta, B.B.1
Badve, O.P.2
-
16
-
-
82955186284
-
Performance evaluation of symmetric cryptography in embedded systems
-
In:, vol
-
Hyncica O, Kucera P, Honzik P, Fiedler P (2011) Performance evaluation of symmetric cryptography in embedded systems. In: Proceedings of the 6th IEEE international conference on intelligent data acquisition and advanced computing systems, vol 1, pp 277–282. doi:10.1109/IDAACS.2011.6072756
-
(2011)
Proceedings of the 6th IEEE international conference on intelligent data acquisition and advanced computing systems
, vol.1
, pp. 277-282
-
-
Hyncica, O.1
Kucera, P.2
Honzik, P.3
Fiedler, P.4
-
17
-
-
41549126361
-
An evaluation framework for more realistic simulations of mpeg video transmission
-
Ke CH, Shieh CK, Hwang WS, Ziviani A et al (2008) An evaluation framework for more realistic simulations of mpeg video transmission. J Inf Sci Eng 24(2):425–440
-
(2008)
J Inf Sci Eng
, vol.24
, Issue.2
, pp. 425-440
-
-
Ke, C.H.1
Shieh, C.K.2
Hwang, W.S.3
Ziviani, A.4
-
18
-
-
84868137874
-
Aes implementation and performance evaluation on 8-bit microcontrollers
-
Lee H, Lee K, Shin Y (2009) Aes implementation and performance evaluation on 8-bit microcontrollers. Int J Comput Sci Inf Secur 6(1):
-
(2009)
Int J Comput Sci Inf Secur
, vol.6
, Issue.1
-
-
Lee, H.1
Lee, K.2
Shin, Y.3
-
19
-
-
84927584035
-
A hybrid cloud approach for secure authorized deduplication
-
Li J, Li YK, Chen X, Lee PPC, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216. doi:10.1109/TPDS.2014.2318320
-
(2015)
IEEE Trans Parallel Distrib Syst
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.K.2
Chen, X.3
Lee, P.P.C.4
Lou, W.5
-
20
-
-
84921381171
-
Identity-based encryption with outsourced revocation in cloud computing
-
Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437. doi:10.1109/TC.2013.208
-
(2015)
IEEE Trans Comput
, vol.64
, Issue.2
, pp. 425-437
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Lou, W.5
-
21
-
-
84930542540
-
L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing
-
Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26. doi:10.1016/j.knosys.2014.04.010. http://www.sciencedirect.com/science/article/pii/S0950705114001324
-
(2015)
Knowl-Based Syst
-
-
Li, J.1
Liu, Z.2
Chen, X.3
Xhafa, F.4
Tan, X.5
Wong, D.S.6
-
24
-
-
84983517994
-
Chandra GPB (2016) Security and privacy for real time video streaming using hierarchical inner product encryption based publish-subscribe architecture
-
Rajan MA, Varghese A, Narendra N, Singh M, Shivraj VL, Chandra GPB (2016) Security and privacy for real time video streaming using hierarchical inner product encryption based publish-subscribe architecture. In: 30th International conference on advanced information networking and applications workshops (WAINA), pp 373–380. doi:10.1109/WAINA.2016.101
-
In: 30th International conference on advanced information networking and applications workshops (WAINA), pp 373–380. doi:10.1109/WAINA
, vol.2016
, pp. 101
-
-
Rajan, M.A.1
Varghese, A.2
Narendra, N.3
Singh, M.4
Shivraj, V.L.5
-
25
-
-
44649109456
-
Methodology for the subjective assessment of the quality of television pictures
-
Recommendation 500-10. Methodology for the subjective assessment of the quality of television pictures. ITU-R Recommendation BT.500–10 (2000)
-
(2000)
ITU-R Recommendation BT
, pp. 500-510
-
-
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126. doi:10.1145/359340.359342
-
(1978)
Commun ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
31
-
-
85008227599
-
-
Gupta B: Secure integration of iot and cloud computing. Fut Gen Comput Syst
-
Stergiou C, Psannis KE, Kim BG, Gupta B (2016) Secure integration of iot and cloud computing. Fut Gen Comput Syst. doi:10.1016/j.future.2016.11.031. http://www.sciencedirect.com/science/article/pii/S0167739X1630694X
-
(2016)
Kim BG
-
-
Stergiou, C.1
Psannis, K.E.2
-
32
-
-
85027028728
-
Dppdl: a dynamic partial-parallel data layout for green video surveillance storage
-
Sun Z, Zhang Q, Li YA, Tan Y (2016) Dppdl: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Transa Circ Syst Vid Technol 99:1–1. doi:10.1109/TCSVT.2016.2605045
-
(2016)
IEEE Transa Circ Syst Vid Technol
, vol.99
, pp. 1
-
-
Sun, Z.1
Zhang, Q.2
Li, Y.A.3
Tan, Y.4
-
33
-
-
83255162618
-
An integrated radix-4 modular divider/multiplier hardware architecture for cryptographic applications
-
Tawalbeh L, Jararweh Y, Mohammad A (2013) An integrated radix-4 modular divider/multiplier hardware architecture for cryptographic applications. Int Arab J Inf Technol 9(3):284–290
-
(2013)
Int Arab J Inf Technol
, vol.9
, Issue.3
, pp. 284-290
-
-
Tawalbeh, L.1
Jararweh, Y.2
Mohammad, A.3
-
36
-
-
18844368499
-
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis Proceedings of the 2003 international conference on compilers, architecture and synthesis for embedded systems, CASES ’0. ACM
-
Venugopalan R, Ganesan P, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Encryption overhead in embedded systems and sensor network nodes: modeling and analysis Proceedings of the 2003 international conference on compilers, architecture and synthesis for embedded systems, CASES ’0. ACM, New York, pp 188–197, doi:10.1145/951710.951737
-
(2003)
New York
, pp. 188-197
-
-
Venugopalan, R.1
Ganesan, P.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
37
-
-
85028162674
-
Rate-sensitive leverage of qos and qop for ubiquitous video streaming via buffer-aware feedback control
-
Wang CH, Liu HS, Hsieh CC (2014) Rate-sensitive leverage of qos and qop for ubiquitous video streaming via buffer-aware feedback control. Multimed Tools Appl 73(2):737–761. doi:10.1007/s11042-012-1186-x
-
(2014)
Multimed Tools Appl
, vol.73
, Issue.2
, pp. 737-761
-
-
Wang, C.H.1
Liu, H.S.2
Hsieh, C.C.3
-
38
-
-
84952049401
-
-
Springer International Publishing, Cham
-
Wei X, Li WX, Ran C, Pi CC, Ma YJ, Sheng YX (2015) Architecture and scheduling method of cloud video surveillance system based on IoT. Springer International Publishing, Cham, pp 551–560. doi:10.1007/978-3-319-27161-3_50
-
(2015)
Architecture and scheduling method of cloud video surveillance system based on IoT
, pp. 551-560
-
-
Wei, X.1
Li, W.X.2
Ran, C.3
Pi, C.C.4
Ma, Y.J.5
Sheng, Y.X.6
-
39
-
-
84953349079
-
Semantic enhanced cloud environment for surveillance data management using video structural description
-
Xu Z, Mei L, Liu Y, Hu C, Chen L (2016) Semantic enhanced cloud environment for surveillance data management using video structural description. Computing 98(1):35–54. doi:10.1007/s00607-014-0408-7
-
(2016)
Computing
, vol.98
, Issue.1
, pp. 35-54
-
-
Xu, Z.1
Mei, L.2
Liu, Y.3
Hu, C.4
Chen, L.5
-
40
-
-
84966642222
-
-
Springer International Publishing, Cham
-
Yang X, Zhang H, Ma H, Li W, Fu G, Tang Y (2016) Multi-resource allocation for virtual machine placement in video surveillance cloud. Springer International Publishing, Cham, pp 544–555. doi:10.1007/978-3-319-31854-7_49
-
(2016)
Multi-resource allocation for virtual machine placement in video surveillance cloud
, pp. 544-555
-
-
Yang, X.1
Zhang, H.2
Ma, H.3
Li, W.4
Fu, G.5
Tang, Y.6
-
41
-
-
84864315637
-
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
Yi S, Jing X, Zhu J, Zhu J, Cheng H (2012) The model of face recognition in video surveillance based on cloud computing. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 105–111. doi:10.1007/978-3-642-30126-1_18
-
(2012)
The model of face recognition in video surveillance based on cloud computing
, pp. 105-111
-
-
Yi, S.1
Jing, X.2
Zhu, J.3
Zhu, J.4
Cheng, H.5
|