Multimedia content encryption techniques and applications
| Main Author: | Lian, Shiguo (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton
CRC Press
c2009
|
| Subjects: |
Similar Items
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
Internet content regulation contemporary legal and regulatory issues in the changing digital landscape
by: Mahyuddin Daud
Published: (2019)
by: Mahyuddin Daud
Published: (2019)
Cryptographic protocol security analysis based on trusted freshness
by: Ling, Dong, et al.
Published: (2012)
by: Ling, Dong, et al.
Published: (2012)
Multimedia security steganography and digital water marking techniques for protection of intellectual property
by: Lu, Chun-Shein
Published: (2005)
by: Lu, Chun-Shein
Published: (2005)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
Security strategy from requirements to reality
by: Stackpole, Bill, et al.
Published: (2011)
by: Stackpole, Bill, et al.
Published: (2011)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Micheal, et al.
Published: (2013)
by: Raggo, Micheal, et al.
Published: (2013)
Cryptography and network security principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Analyzing computer security a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Computer forensics and privacy
by: Caloyannnides, Michael A.
Published: (2001)
by: Caloyannnides, Michael A.
Published: (2001)
Visual cryptography and secret image sharing
by: Ching-Nung, Yang, et al.
Published: (2012)
by: Ching-Nung, Yang, et al.
Published: (2012)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Mobile device security : a comprehensive guide to securing your information in a moving world
by: Fried, Stephen , 1962-
Published: (2010)
by: Fried, Stephen , 1962-
Published: (2010)
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011)
by: Rosenberg, Burton
Published: (2011)
Multimedia content analysis and mining international workshop, MCAM 2007, Weihai, China, June 30-July 1, 2007 proceedings
by: Sebe, Nicu
Published: (2007)
by: Sebe, Nicu
Published: (2007)
Managing and mining multimedia databases
by: Thuraisingham, Bhavani M.
Published: (2001)
by: Thuraisingham, Bhavani M.
Published: (2001)
UNIX system security how to protect your date and prevent intruders
by: Farrow, Rik 1950-
Published: (1991)
by: Farrow, Rik 1950-
Published: (1991)
Hacking exposed 6 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2009)
by: McClure, Stuart, et al.
Published: (2009)
Hacking exposed network security secrets and solutions
by: McClure, Stuart, et al.
Published: (2005)
by: McClure, Stuart, et al.
Published: (2005)
Internet security secrets
by: Vacca, John R.
Published: (1996)
by: Vacca, John R.
Published: (1996)
An enhanced authentication method based on user experience
by: Amirulihsan Mohamad
by: Amirulihsan Mohamad
Practical information security management a completeguide to planning and implementation
by: Campbell, Tony
by: Campbell, Tony
Information security management concepts and practice
by: Raggad, Bel G.
Published: (2010)
by: Raggad, Bel G.
Published: (2010)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D., et al.
Published: (2009)
by: Collette, Ronald D., et al.
Published: (2009)
Information security management handbook .
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2012)
Published: (2012)
Information security management handbook Volume 4
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014)
by: Courtney, Kylan
Published: (2014)
Security in computing
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
Information hiding 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 revised selected papers
by: Camenisch, Jan
Published: (2007)
by: Camenisch, Jan
Published: (2007)
Similar Items
-
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007) -
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011) -
Internet content regulation contemporary legal and regulatory issues in the changing digital landscape
by: Mahyuddin Daud
Published: (2019) -
Cryptographic protocol security analysis based on trusted freshness
by: Ling, Dong, et al.
Published: (2012) -
Multimedia security steganography and digital water marking techniques for protection of intellectual property
by: Lu, Chun-Shein
Published: (2005)