Author:
Guellier Antoine,Bidan Christophe,Prigent Nicolas
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)
2. Chlamtac, I., Conti, M., Liu, J.J.N.: Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks 1(1), 13–64 (2003)
3. Cohn, W.A.: Yahoo’s china defense. The New Presence 9(3), 30–33 (2007)
4. Lecture Notes in Computer Science;I. Damgård,2001
5. IFIP;C. Diaz,2004
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Big Data and Privacy State of the Art;Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government;2021
2. Big Data and Privacy State of the Art;Advances in Computational Intelligence and Robotics;2019
3. Color image encryption in non-RGB color spaces;Multimedia Tools and Applications;2017-09-05
4. Color Image Encryption in CIE L*a*b* Space;Applications and Techniques in Information Security;2015
5. An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map;Applications and Techniques in Information Security;2015