![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2023
- Chiara Suraci, Giuseppe Marrara, Antonella Molinaro, Giuseppe Araniti:
Secure D2D Communications in 6G-oriented Networks for Multimedia eHealth Applications. BMSB 2023: 1-6 - 2022
- Damandeep Kaur, Khushil Kumar Saini, Devender Kumar
:
Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multim. Tools Appl. 81(27): 39367-39385 (2022) - Razieh Hedayati, Seyedakbar Mostafavi
:
A Lightweight Image Encryption Algorithm for Secure Communications in Multimedia Internet of Things. Wirel. Pers. Commun. 123(2): 1121-1143 (2022) - 2021
- Sara Pizzi
, Chiara Suraci
, Antonio Iera
, Antonella Molinaro
, Giuseppe Araniti
:
A Sidelink-Aided Approach for Secure Multicast Service Delivery: From Human-Oriented Multimedia Traffic to Machine Type Communications. IEEE Trans. Broadcast. 67(1): 313-323 (2021) - Sara Pizzi, Chiara Suraci, Antonio Iera, Antonella Molinaro, Giuseppe Araniti:
A Sidelink-Aided Approach for Secure Multicast Service Delivery: from Human-Oriented Multimedia Traffic to Machine Type Communications. CoRR abs/2110.03537 (2021) - 2020
- Ibrahim Yasser
, Mohamed Azim Mohamed
, Ahmed Shaban Samrah
, Fahmi Khalifa
:
A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications. Entropy 22(11): 1253 (2020) - Amit Kumar Singh
, Zhihan Lv
, Huimin Lu, Xiaojun Chang
:
Guest editorial: Recent trends in multimedia data-hiding: a reliable mean for secure communications. J. Ambient Intell. Humaniz. Comput. 11(5): 1795-1797 (2020) - 2018
- SK Hafizul Islam
, Pandi Vijayakumar
, Md. Zakirul Alam Bhuiyan
, Ruhul Amin, Varun Rajeev M., Balamurugan Balusamy
:
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications. IEEE Internet Things J. 5(5): 3408-3418 (2018) - Dheerendra Mishra
, Pandi Vijayakumar
, Venkatasamy Sureshkumar
, Ruhul Amin, SK Hafizul Islam, Prosanta Gope:
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multim. Tools Appl. 77(14): 18295-18325 (2018) - 2014
- Faysal Boukayoua, Jorn Lapon
, Bart De Decker, Vincent Naessens:
Secure Storage on Android with Context-Aware Access Control. Communications and Multimedia Security 2014: 46-59 - 2012
- Elke Franz, Stefan Pfennig, André Fischer:
Efficiency of Secure Network Coding Schemes. Communications and Multimedia Security 2012: 145-159 - 2011
- Mahdi R. Alaghband, Mohammad Reza Aref:
A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks. Communications and Multimedia Security 2011: 18-31 - Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
:
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version). Communications and Multimedia Security 2011: 32-44 - Mohamed Maachaoui, Anas Abou El Kalam
, Christian Fraboul:
A Secure One-Way Authentication Protocol in IMS Context. Communications and Multimedia Security 2011: 222-231 - Milica Milutinovic, Roel Peeters
, Bart De Decker:
Secure Negotiation for Manual Authentication Protocols. Communications and Multimedia Security 2011: 214-221 - Dung Q. Nguyen, Li Weng, Bart Preneel
:
Radon Transform-Based Secure Image Hashing. Communications and Multimedia Security 2011: 186-193 - Li Weng, Bart Preneel
:
A Secure Perceptual Hash Algorithm for Image Content Authentication. Communications and Multimedia Security 2011: 108-121 - 2010
- Liam M. Mayron:
Secure Multimedia Communications. IEEE Secur. Priv. 8(6): 76-79 (2010) - Sebastian Roschke, Luan Ibraimi, Feng Cheng, Christoph Meinel:
Secure Communication Using Identity Based Encryption. Communications and Multimedia Security 2010: 256-267 - Amitabh Saxena, Ben Soh:
A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. Communications and Multimedia Security 2010: 4-15 - Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee:
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. Communications and Multimedia Security 2010: 214-232 - 2006
- Giulia Boato:
Innovative methodologies for secure multimedia communications using Birkhoff polynomial interpolation. University of Trento, Italy, 2006 - Heiko Rossnagel
, Tobias Scherner:
Secure Mobile Notifications of Civilians in Case of a Disaster. Communications and Multimedia Security 2006: 33-42 - Pantelis A. Frangoudis, George C. Polyzos
:
Peer-to-Peer Secure and Private Community Based Multimedia Communications. ISM 2006: 1004-1010 - 2005
- Wiebke Dresp:
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. Communications and Multimedia Security 2005: 230-239 - Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk:
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. Communications and Multimedia Security 2005: 291-300 - Minsoo Lee, Sehyun Park:
A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks. Communications and Multimedia Security 2005: 220-229 - Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland:
An Architecture for Secure Policy Enforcement in E-Government Services Deployment. Communications and Multimedia Security 2005: 284-285 - Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu
, Geyong Min:
A Key Embedded Video Codec for Secure Video Multicast. Communications and Multimedia Security 2005: 77-87 - 2004
- Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina:
Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application. Communications and Multimedia Security 2004: 159-171
skipping 28 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-14 20:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint