Elements of Information Theory, 1991. ,
Real Analysis, Modern Techniques and Their Applications, 1999. ,
Low power scalable encryption for wireless systems, Wireless Networks, vol.4, issue.1, pp.55-70, 1998. ,
DOI : 10.1023/A:1019175216292
Middleware support for tunable encryption, Proceedings of the 5th International Workshop on Wireless Information Systems, 2006. ,
Security implications of selective encryption, Proceedings of the 6th International Workshop on Security Measurements and Metrics, MetriSec '10, 2010. ,
DOI : 10.1145/1853919.1853931
Selective bitplane encryption for secure transmission of image data in mobile environments, Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG'02), 2002. ,
Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames, Proceedings of the 17th European Signal Processing Conference, pp.2201-2205, 2009. ,
DOI : 10.1109/TCSVT.2011.2129090
URL : https://hal.archives-ouvertes.fr/lirmm-00416013
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video, Proceedings of Fourth International Conference on Computer Communications and Networks, IC3N'95, pp.72-78, 1995. ,
DOI : 10.1109/ICCCN.1995.540095
Hierarchical selective encryption for G.729 speech based on bit sensitivity, Journal of Internet Technology, vol.10, issue.5, pp.599-608, 2010. ,