Search Results - (( developing frames encryption algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- developing frames »
- frames encryption »
- java application »
-
1
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
-
3
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. …”
Get full text
Get full text
Get full text
Article -
4
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Diagnosis security problems in cloud computing for business cloud
Published 2023“…Secondly , they prefer to develop the multi-key cipher algorithm in order to manage the encryption based on the level of security. � 2005 - 2016 JATIT & LLS. …”
Article -
8
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
9
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
