共 19 条
[1]
Acharya Bibhudendra, 2008, 2008 1st International Conference on Emerging Trends in Engineering and Technology (ICETET), P77, DOI 10.1109/ICETET.2008.110
[2]
Gonzalez Rafael C., DIGITAL IMAGE PROCES
[3]
HiralRathod Mahendra Singh Sisodia, International Journal of Computer Technology and Electronics Engineering (IJCTEE), V1
[5]
Cryptanalysis of a data security protection scheme for VoIP
[J].
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING,
2006, 153 (01)
:1-10
[7]
Mohan Arun K, 2014, INT C CONT COMP INF
[8]
Nayak Chinmaya Kumar, 2011, INT J RES REV COMPUT, V2
[9]
Nicole R., J. Name Stand. Abbrev.
[10]
Schneier B., 2015, Applied Cryptography, VSecond