T. Cover and J. Thomas, Elements of Information Theory, 1991.

G. B. Folland, Real Analysis, Modern Techniques and Their Applications, 1999.

J. Goodman and A. P. Chandrakasan, Low power scalable encryption for wireless systems, Wireless Networks, vol.4, issue.1, pp.55-70, 1998.
DOI : 10.1023/A:1019175216292

S. Lindskog, R. Lundin, and A. Brunstrom, Middleware support for tunable encryption, Proceedings of the 5th International Workshop on Wireless Information Systems, 2006.

R. Lundin and S. Lindskog, Security implications of selective encryption, Proceedings of the 6th International Workshop on Security Measurements and Metrics, MetriSec '10, 2010.
DOI : 10.1145/1853919.1853931

M. Podesser, H. P. Schmidt, and A. Uhl, Selective bitplane encryption for secure transmission of image data in mobile environments, Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG'02), 2002.

Z. Shahid, M. Chaumont, and W. Puech, Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames, Proceedings of the 17th European Signal Processing Conference, pp.2201-2205, 2009.
DOI : 10.1109/TCSVT.2011.2129090

URL : https://hal.archives-ouvertes.fr/lirmm-00416013

G. A. Spanos and T. B. Maples, Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video, Proceedings of Fourth International Conference on Computer Communications and Networks, IC3N'95, pp.72-78, 1995.
DOI : 10.1109/ICCCN.1995.540095

Z. Su, J. Jiang, S. Lian, G. Zhang, and D. Hu, Hierarchical selective encryption for G.729 speech based on bit sensitivity, Journal of Internet Technology, vol.10, issue.5, pp.599-608, 2010.