Sciweavers

461 search results - page 14 / 93
» The RC5 Encryption Algorithm
Sort
View
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
14 years 2 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
CN
2006
83views more  CN 2006»
13 years 7 months ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
13 years 11 months ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
IFIP
2009
Springer
14 years 2 months ago
Enhancing Progressive Encryption for Scalable Video Streams
The technique called progressive encryption is used in many areas of content security. However, the plain algorithm itself is only applicable in real transmission scenarios where n...
Viktor Gergely, Gábor Fehér
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices
Abstract Secure video communication on mobile handheld devices is challenging mainly due to (a) the significant computational needs of both video coding and encryption algorithms ...
Kyoungwoo Lee, Nikil Dutt, Nalini Venkatasubramani...