- 2023
- Chiara Suraci, Giuseppe Marrara, Antonella Molinaro, Giuseppe Araniti:
Secure D2D Communications in 6G-oriented Networks for Multimedia eHealth Applications. BMSB 2023: 1-6 - 2022
- Damandeep Kaur, Khushil Kumar Saini, Devender Kumar
:
Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multim. Tools Appl. 81(27): 39367-39385 (2022) - Razieh Hedayati, Seyedakbar Mostafavi
:
A Lightweight Image Encryption Algorithm for Secure Communications in Multimedia Internet of Things. Wirel. Pers. Commun. 123(2): 1121-1143 (2022) - 2021
- Sara Pizzi
, Chiara Suraci
, Antonio Iera
, Antonella Molinaro
, Giuseppe Araniti
:
A Sidelink-Aided Approach for Secure Multicast Service Delivery: From Human-Oriented Multimedia Traffic to Machine Type Communications. IEEE Trans. Broadcast. 67(1): 313-323 (2021) - Sara Pizzi, Chiara Suraci, Antonio Iera, Antonella Molinaro, Giuseppe Araniti:
A Sidelink-Aided Approach for Secure Multicast Service Delivery: from Human-Oriented Multimedia Traffic to Machine Type Communications. CoRR abs/2110.03537 (2021) - 2020
- Ibrahim Yasser
, Mohamed Azim Mohamed
, Ahmed Shaban Samrah
, Fahmi Khalifa
:
A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications. Entropy 22(11): 1253 (2020) - Amit Kumar Singh
, Zhihan Lv
, Huimin Lu, Xiaojun Chang
:
Guest editorial: Recent trends in multimedia data-hiding: a reliable mean for secure communications. J. Ambient Intell. Humaniz. Comput. 11(5): 1795-1797 (2020) - 2018
- SK Hafizul Islam
, Pandi Vijayakumar
, Md. Zakirul Alam Bhuiyan
, Ruhul Amin, Varun Rajeev M., Balamurugan Balusamy
:
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications. IEEE Internet Things J. 5(5): 3408-3418 (2018) - Dheerendra Mishra
, Pandi Vijayakumar
, Venkatasamy Sureshkumar
, Ruhul Amin, SK Hafizul Islam, Prosanta Gope:
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multim. Tools Appl. 77(14): 18295-18325 (2018) - 2014
- Faysal Boukayoua, Jorn Lapon
, Bart De Decker, Vincent Naessens:
Secure Storage on Android with Context-Aware Access Control. Communications and Multimedia Security 2014: 46-59 - 2012
- Elke Franz, Stefan Pfennig, André Fischer:
Efficiency of Secure Network Coding Schemes. Communications and Multimedia Security 2012: 145-159 - 2011
- Mahdi R. Alaghband, Mohammad Reza Aref:
A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks. Communications and Multimedia Security 2011: 18-31 - Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
:
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version). Communications and Multimedia Security 2011: 32-44 - Mohamed Maachaoui, Anas Abou El Kalam
, Christian Fraboul:
A Secure One-Way Authentication Protocol in IMS Context. Communications and Multimedia Security 2011: 222-231 - Milica Milutinovic, Roel Peeters
, Bart De Decker:
Secure Negotiation for Manual Authentication Protocols. Communications and Multimedia Security 2011: 214-221 - Dung Q. Nguyen, Li Weng, Bart Preneel
:
Radon Transform-Based Secure Image Hashing. Communications and Multimedia Security 2011: 186-193 - Li Weng, Bart Preneel
:
A Secure Perceptual Hash Algorithm for Image Content Authentication. Communications and Multimedia Security 2011: 108-121 - 2010
- Liam M. Mayron:
Secure Multimedia Communications. IEEE Secur. Priv. 8(6): 76-79 (2010) - Sebastian Roschke, Luan Ibraimi, Feng Cheng, Christoph Meinel:
Secure Communication Using Identity Based Encryption. Communications and Multimedia Security 2010: 256-267 - Amitabh Saxena, Ben Soh:
A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. Communications and Multimedia Security 2010: 4-15 - Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee:
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. Communications and Multimedia Security 2010: 214-232 - 2006
- Giulia Boato:
Innovative methodologies for secure multimedia communications using Birkhoff polynomial interpolation. University of Trento, Italy, 2006 - Heiko Rossnagel
, Tobias Scherner:
Secure Mobile Notifications of Civilians in Case of a Disaster. Communications and Multimedia Security 2006: 33-42 - Pantelis A. Frangoudis, George C. Polyzos
:
Peer-to-Peer Secure and Private Community Based Multimedia Communications. ISM 2006: 1004-1010 - 2005
- Wiebke Dresp:
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. Communications and Multimedia Security 2005: 230-239 - Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk:
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. Communications and Multimedia Security 2005: 291-300 - Minsoo Lee, Sehyun Park:
A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks. Communications and Multimedia Security 2005: 220-229 - Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland:
An Architecture for Secure Policy Enforcement in E-Government Services Deployment. Communications and Multimedia Security 2005: 284-285 - Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu
, Geyong Min:
A Key Embedded Video Codec for Secure Video Multicast. Communications and Multimedia Security 2005: 77-87 - 2004
- Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina:
Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application. Communications and Multimedia Security 2004: 159-171