<p>Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features
Algorithms, architectures and information systems security
โ Scribed by Aditya Bagchi, Bhargab B. Bhattacharya, Susmita Sur-kolay, Subhas C. Nandy
- Publisher
- World Scientific
- Year
- 2009
- Tongue
- English
- Leaves
- 384
- Series
- Statistical science and interdisciplinary research 3
- Category
- Library
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: r
<p><p>This text presents a theoretical and practical examination of the latest developments in Information Retrieval and their application to existing systems. By starting with a functional discussion of what is needed for an information system, the reader can grasp the scope of information retrieva
<p><p>This text presents a theoretical and practical examination of the latest developments in Information Retrieval and their application to existing systems. By starting with a functional discussion of what is needed for an information system, the reader can grasp the scope of information retrieva