4.7 Article

A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Virtual Network Recognition and Optimization in SDN-Enabled Cloud Environment

He Li et al.

Summary: Cloud computing is a scalable and efficient technology for providing various services. Users build virtual networks in cloud environments for better reconfigurability, and it is necessary to recognize and optimize virtual networks with different applications. This paper presents a virtual network recognition and optimization method using community detection and scheduling strategy to improve quality-of-service and fulfill SLAs.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Theory & Methods

DC coefficient recovery for JPEG images in ubiquitous communication systems

Han Qiu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Improving Cloud-Based IoT Services Through Virtual Network Embedding in Elastic Optical Inter-DC Networks

Wenting Wei et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme

Liwei Kuang et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)

Article Automation & Control Systems

Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers

Keke Gai et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks

Jun Wu et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)

Article Computer Science, Information Systems

Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things

Keke Gai et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks

Jun Wu et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)

Article Medicine, General & Internal

A glimpse of 21st century care

Steve Hambleton

AUSTRALIAN JOURNAL OF GENERAL PRACTICE (2018)

Article Computer Science, Information Systems

Intelligent cryptography approach for secure distributed big data storage in cloud computing

Yibin Li et al.

INFORMATION SCIENCES (2017)

Article Engineering, Electrical & Electronic

Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks

Keke Gai et al.

IEEE TRANSACTIONS ON SMART GRID (2017)

Article Computer Science, Information Systems

Efficient selective image encryption

Ahmed M. Ayoup et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Hardware & Architecture

Privacy Protection for Preventing Data Over-Collection in Smart City

Yibin Li et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Engineering, Electrical & Electronic

Outsourcing chaotic selective image encryption to the cloud with steganography

Tao Xiang et al.

DIGITAL SIGNAL PROCESSING (2015)

Article Computer Science, Hardware & Architecture

Fast filter bank convolution for three-dimensional wavelet transform by shared memory on mobile GPU computing

Di Zhao

JOURNAL OF SUPERCOMPUTING (2015)

Article Computer Science, Theory & Methods

A Survey of Methods for Analyzing and Improving GPU Energy Efficiency

Sparsh Mittal et al.

ACM COMPUTING SURVEYS (2015)

Proceedings Paper Computer Science, Information Systems

Comb to Pipeline: Fast Software Encryption Revisited

Andrey Bogdanov et al.

FAST SOFTWARE ENCRYPTION, FSE 2015 (2015)

Article Computer Science, Software Engineering

Fast Selective Encryption Methods for Bitmap Images

Han Qiu et al.

INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT (2015)

Article Computer Science, Information Systems

Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings

Zafar Shahid et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2014)

Article Engineering, Electrical & Electronic

Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks

Tao Xiang et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2014)

Article Engineering, Electrical & Electronic

Selective image encryption in fractional wavelet domain

Nidhi Taneja et al.

AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2011)

Article Optics

A novel image encryption method based on total shuffling scheme

Guoji Zhang et al.

OPTICS COMMUNICATIONS (2011)

Article Computer Science, Software Engineering

Real-Time Parallel Hashing on the GPU

Dan A. Alcantara et al.

ACM TRANSACTIONS ON GRAPHICS (2009)

Article Engineering, Electrical & Electronic

Scope of validity of PSNR in image/video quality assessment

Q. Huynh-Thu et al.

ELECTRONICS LETTERS (2008)

Review Computer Science, Information Systems

Overview on Selective Encryption of Image and Video: Challenges and Perspectives

A. Massoudi et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2008)

Article Physics, Multidisciplinary

Chaos-based image encryption algorithm

ZH Guan et al.

PHYSICS LETTERS A (2005)

Article Computer Science, Information Systems

Selective encryption of wavelet-packet encoded image data: efficiency and security

A Pommer et al.

MULTIMEDIA SYSTEMS (2003)

Article Engineering, Electrical & Electronic

A proposal for supporting selective encryption in JPSEC

W Sadourny et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2003)

Article Engineering, Electrical & Electronic

Overview of fine granularity scalability in MPEG-4 video standard

WP Li

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2001)