Multimedia content encryption : techniques and applications
Main Author: | Lian, Shiguo (Author) |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton :
CRC Press ,
c2009
|
Subjects: |
Similar Items
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 : revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
Cryptographic protocol : security analysis based on trusted freshness
by: Ling, Dong, et al.
Published: (2012)
by: Ling, Dong, et al.
Published: (2012)
Multimedia security : steganography and digital water marking techniques for protection of intellectual property
by: Lu, Chun-Shein
Published: (2005)
by: Lu, Chun-Shein
Published: (2005)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Micheal, et al.
Published: (2013)
by: Raggo, Micheal, et al.
Published: (2013)
Security strategy : from requirements to reality
by: Stackpole, Bill, et al.
Published: (2011)
by: Stackpole, Bill, et al.
Published: (2011)
Cryptography and network security : principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Cryptography and network security : principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security : principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Information security intelligence : cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Selected areas in cryptography : 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 : revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Privacy-preserving data mining : models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Analyzing computer security : a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. , 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. , 1948-, et al.
Published: (2012)
Visual cryptography and secret image sharing
by: Ching-Nung, Yang, et al.
Published: (2012)
by: Ching-Nung, Yang, et al.
Published: (2012)
Cryptography : Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Mobile device security : a comprehensive guide to securing your information in a moving world
by: Fried, Stephen , 1962-
Published: (2010)
by: Fried, Stephen , 1962-
Published: (2010)
Multimedia content analysis and mining : international workshop, MCAM 2007, Weihai, China, June 30-July 1, 2007 : proceedings
by: Sebe, Nicu
Published: (2007)
by: Sebe, Nicu
Published: (2007)
Managing and mining multimedia databases
by: Thuraisingham, Bhavani M.
Published: (2001)
by: Thuraisingham, Bhavani M.
Published: (2001)
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011)
by: Rosenberg, Burton
Published: (2011)
UNIX system security : how to protect your date and prevent intruders
by: Farrow, Rik , 1950-
Published: (1991)
by: Farrow, Rik , 1950-
Published: (1991)
Hacking exposed 6 : network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2009)
by: McClure, Stuart, et al.
Published: (2009)
Hacking exposed : network security secrets and solutions
by: McClure, Stuart, et al.
Published: (2005)
by: McClure, Stuart, et al.
Published: (2005)
Information security management : concepts and practice
by: Raggad, Bel G.
Published: (2010)
by: Raggad, Bel G.
Published: (2010)
Practical information security management : a completeguide to planning and implementation
by: Campbell, Tony
by: Campbell, Tony
An enhanced authentication method based on user experience
by: Amirulihsan Mohamad
by: Amirulihsan Mohamad
Internet security secrets
by: Vacca, John R.
Published: (1996)
by: Vacca, John R.
Published: (1996)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Information security management handbook .
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2012)
Published: (2012)
Information security management handbook Volume 4
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D., et al.
Published: (2009)
by: Collette, Ronald D., et al.
Published: (2009)
Information privacy [ concepts & applications
by: Courtney, Kylan
Published: (2014)
by: Courtney, Kylan
Published: (2014)
Security in computing
by: Pfleeger, Charles P. , 1948-, et al.
Published: (2007)
by: Pfleeger, Charles P. , 1948-, et al.
Published: (2007)
Digital watermarking and steganography
by: Cox, I. J. [ (Ingemar J.)]
Published: (2008)
by: Cox, I. J. [ (Ingemar J.)]
Published: (2008)
Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers
by: Camenisch, Jan
Published: (2007)
by: Camenisch, Jan
Published: (2007)
Managing an information security and privacy awareness and training program
by: Herold, Rebecca
Published: (2011)
by: Herold, Rebecca
Published: (2011)
Similar Items
-
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 : revised selected papers
by: Biryukov, Alex
Published: (2007) -
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011) -
Cryptographic protocol : security analysis based on trusted freshness
by: Ling, Dong, et al.
Published: (2012) -
Multimedia security : steganography and digital water marking techniques for protection of intellectual property
by: Lu, Chun-Shein
Published: (2005) -
Information security governance
by: Solms Von, S. H.
Published: (2009)