Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 10
Page No. 1574 - 1578

Attempting to Preserve Energy During Private Data Delivery Using Various Encryption Techniques

Authors : G. Selvavinayagam and K. Umamheswari

References

Chandramouli, R., M. Kharrazi and N. Memon, 2003. Image Steganography and Steganalysis: Concepts and Practice. In: Digital Watermarking, Kalker, T., I.J. Cox and Y.M. Ro (Eds.). Springer-Verlag, Berlin, Germany, ISBN-13: 978-3-540-21061-0, pp: 35-49.

Fontaine, C. and F. Galand, 2007. A survey of homomorphic encryption for nonspecialists. EURASIP. J. Inf. Secur., 2007: 1-15.
CrossRef  |  Direct Link  |  

Gentry, C., 2010. Computing arbitrary functions of encrypted data. J. Commun. ACM, 53: 97-105.
CrossRef  |  Direct Link  |  

Jacobs, C.E., A. Finkelstein and D.H. Salesin, 1995. Fast multiresolution image querying. Proceedings of the 22nd Annual Conference on Computer Graphics and Interactive Techniques, September 6-11, 1995, ACM, New York, USA., ISBN: 0-89791-701-4, pp: 277-286.

Liu, J., K. Kumar and Y.H. Lu, 2010. Tradeoff between energy savings and privacy protection in computation offloading. Proceedings of the 16th ACM/IEEE International Symposium on Low Power Electronics and Design, August 18-20, 2010, ACM, New York, USA., ISBN: 978-1-4503-0146-6, pp: 213-218.

Ng, C.R., G. Lu and D. Zhang, 2005. Performance study of gabor filters and rotation invariant gabor filters. Proceedings of the 11th International Conference on Multimedia Modelling, January 12-14, 2005, IEEE, New York, USA., ISBN: 0-7695-2164-9, pp: 158-162.

Rong, P. and M. Pedram, 2003. Extending the lifetime of a network of battery-powered mobile devices by remote processing: A markovian decision-based approach. Proceedings of the 40th Internatiomnal Conference on Annual Design Automation, June 2-6, 2003, ACM, New York, USA., ISBN:1-58113-688-9, pp: 906-911.

Vimercati, S.D.C.D., S. Foresti, S. Jajodia, S. Paraboschi and G. Pelosi et al., 2008. Preserving confidentiality of security policies in data outsourcing. Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, October 27-31, 2008, ACM, New York, USA., ISBN: 978-1-60558-289-4, pp: 75-84.

Wolski, R., S. Gurun, C. Krintz and D. Nurmi, 2008. Using bandwidth data to make computation offloading decisions. Proceedings of the IEEE International Symposium on Parallel and Distributed Processing, April 14-18, 2008, IEEE, Miami, Florida, ISBN: 978-1-4244-1694-3, pp: 1-8.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved