RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A General Encryption Algorithm for Different Format Videos

        Hao Li,Cheng Yang,Jiayin Tian,Jianbo Liu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.10

        With the rapid development of social network, more and more information is being presented in the form of multimedia, so the security of multimedia files, especially video files, has been capturing the attention of the researchers. Video encryption is widely applied to the DRM system, video conference, medical and military fields and so on. A general video encryption algorithm is proposed to solve the problem that the existing multiple formats (compression formats and container formats) of video requires a unified encryption scheme. Meanwhile, the proposed scheme can not only provide variable levels of security, but also have good performance of compression efficiency and computational complexity, which can ensure that the encrypted video data can be operation.

      • Lightweight Key Distribution Protocol for Streaming Media DRM

        Hao Li,Tang Xuyue,Jiayin Tian,Jianbo Liu,Cheng Yang 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.9

        In the daily-real systems, protecting the data only is far less enough. The process about the generation, distribution, storage, and the revocation of the key is the core problem in the system-security consideration. If the management of the key is insecure, attackers could easily get the key used in the encryption steps to the context, leading to useless processing in the encryption no matter how secure the system be. Unlike the period of validity for the different key, the key can easily be attacked by various methods due to its distribution through the complex net links, which would bring about the threatening of the security. In this paper, we analyze three models of the key distribution, associated with the actual applications for the encryption in the hypermedia video stream. Besides, we raise up a new protocol based on the IKEV2 distribution protocol and evaluate the stability when it suffer the Man-in –the-Middle Attacks, DoS and Replay attacks.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼