Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Heng-tai Ma"'
Publikováno v:
Tongxin xuebao, Vol 35, Pp 174-181 (2014)
Based on structures and dependencies of the image codestreams, a scalable stream-level authentication ap-proach was proposed to resist packet loss. To construct the authentication algorithm by hash chaining and error-correction coding, the proposed a
Externí odkaz:
https://doaj.org/article/34032c7bc5f04cfdae008e86f7105d0b
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
Rootkits are prevalent in today’s Internet. Using virtual machine monitor (VMM) is an attractive way to deal with rootkits. However, most of the previous studies do not focus on protecting kernel data using VMMs, especially for the data that may be
Publikováno v:
DEStech Transactions on Computer Science and Engineering.