共 19 条
[1]
Aggarwal G., 2005, P 2 BIENN C INN DAT, P186
[2]
[Anonymous], 2009, EUR J SCI RES
[3]
Bessani A., 2011, EUROSYS 11
[4]
Bkakria Anis, 2013, Information and Communication Technology. International Conference, ICT-EurAsia 2013. Proceedings: LNCS 7804, P426, DOI 10.1007/978-3-642-36818-9_47
[5]
Ciriani V., 2010, ACM T INF SYS SECURI
[6]
Fabre J.-C., 1994, Dependable Computing - EDCC-1. First European Dependable Computing Conference Proceedings, P21
[7]
Fray J.-M., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P194
[8]
Hudic A., 2012, INT J COMM NETWORKS, V1
[9]
Kapusta K., 2015, DATA PROTECTION MEAN
[10]
Performance study of selective encryption in comparison to full encryption for still visual images
[J].
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS,
2014, 15 (06)
:435-444