A survey of video encryption algorithms

F Liu, H Koenig - computers & security, 2010 - Elsevier
The popularity of multimedia applications is rapidly growing nowadays. The confidentiality of
video communication is of primary concern for commercial usage, eg in video on demand …

Scalable secure one-to-many group communication using dual encryption

LR Dondeti, S Mukherjee, A Samal - Computer Communications, 2000 - Elsevier
Multicasting is a scalable solution for group communication. Whereas secure unicast is a
well-understood problem, scalable secure multicast poses several unique security …

Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks

J Girao, D Westhoff, E Mykletun, T Araki - Ad Hoc Networks, 2007 - Elsevier
In wireless sensor networks there is a need to securely store monitored data in a distributed
way whenever it is either not desired or simply not possible to transmit regional volatile …

A public key encryption scheme based on idempotent semirings

M Durcheva, M Rachev - AIP Conference Proceedings, 2015 - pubs.aip.org
The problem of solving two sided linear equations in the idempotent semirings Rmax and
Rmin has been proved to be reducible to the problem mean payoff game which is of the …

Performance optimizations for certificate revocation

BH Li, YL Zhao, YB Hou - 2004 IEEE International Workshop on …, 2004 - ieeexplore.ieee.org
Certificate revocation is an outstanding problem in PKI. This paper extends Naor's scheme
of dynamic hash tree in order to optimize performance. Set of revoked certificates is divided …

Design implementation and analysis of a dynamic cryptography algorithm with applications

S Ghose - 2007 - digitalscholarship.unlv.edu
Cryptographers need to provide the world with a new encryption standard. DES, the major
encryption algorithm for the past fifteen years, is nearing the end of its useful life. Its 56-bit …