Author:
Rawat Umashankar,Roy Satyabrata,Acharya Saket,Kumar Krishna
Reference15 articles.
1. R. Teigao, C. Maziero, A. Santin, Applying a usage control model in an operating system kernel. J. Netw. Comput. Appl. 34(4), 1342–1352 (2011)
2. M. Broz, dm-crypt: Linux kernel device-mapper crypto target (2015)
3. U. Rawat, S. Kumar, Distributed encrypting file system for linux in user-space. Int. J. Comput. Netw. Inf. Sec. 4(8), 33 (2012)
4. N. Dey, V. Santhi, Intelligent Techniques in Signal Processing for Multimedia Security (Springer, 2017)
5. S. Nandi, S. Roy, S. Nath, S. Chakraborty, W.B.A. Karaa, N. Dey, 1-d group cellular automata based image encryption technique, in 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (IEEE, 2014), pp. 521–526
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献