TITLE

Snails and Puppy Dog's Tails

AUTHOR(S)
Masciarotte, Oliver
PUB. DATE
February 2004
SOURCE
Mix;Feb2004, Vol. 28 Issue 3, p84
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Talks about Open Source Software. Evaluation of the MPEG Database; Functionality of the Advanced Encryption Standard; Open Source donation for serving a Web site.
ACCESSION #
12078853

 

Related Articles

  • Efficient video encryption scheme based on advanced video coding. Shiguo Lian; Jinsheng Sun; Guangjie Liu; Zhiquan Wang // Multimedia Tools & Applications;May2008, Vol. 38 Issue 1, p75 

    Abstract  A video encryption scheme combining with advanced video coding (AVC) is presented and analyzed in this paper, which is different from the ones used in MPEG1/2 video encryption. In the proposed scheme, the intra-prediction mode and motion vector difference are encrypted with the...

  • ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM. Sharma, Puneet Kr; Rajni // International Journal of Information Sciences & Techniques;Jul2012, Vol. 2 Issue 4, p95 

    The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But this advantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking. So In order to transfer the...

  • On the DCT Based Joint Fingerprint Embedding and Decryption Scheme.  // Journal of Multimedia;Oct2010, Vol. 5 Issue 5, p473 

    No abstract available.

  • OfficeLock. Stephenson, Peter // SC Magazine: For IT Security Professionals (UK Edition);Oct2005, p64 

    Evaluates the OfficeLock disk encryptor from Interfuse Technology. Features of the device; Pros and cons; Price of the product.

  • OpenPGP.  // Network Dictionary;2007, p354 

    A definition of the term "OpenPGP" is presented. It refers to an open source implementation of Pretty Good Privacy (PGP) encryption scheme.

  • Proposal for Two Enhanced NTRU. Sadiq, Ahmed Tariq; Hussein, Najlaa Mohammad; Raheem Khoja, Suha Abdul // International Journal of Advanced Computer Science & Application;May2014, Vol. 5 Issue 5, p48 

    Sound is very widely used in communication. In order to ensure secure communication a cryptographic data scheme is used. Secure sound is needed in many fields such as military, business, banking and electronic commerce. There is also an increasing demand for secured sound in network...

  • MEET THE EBIF USER AGENT. Ellis, Leslie // Multichannel News;12/15/2008, Vol. 29 Issue 49, p20 

    The article reviews the Enhanced TV Binary Interchange Format (EBIF) user agent.

  • SmoothWall Express Version 2.0.  // Database & Network Journal;Feb2004, Vol. 34 Issue 1, p21 

    The SmoothWall Express 2.0 is the latest version of the Open Source firewall designed for ease of use and requires no knowledge of Linux to install or configure. The enhancements include ease of configuration, documentation, stateful inspection, broadband, networking, dynamic DNS providers along...

  • The year of the DVD recordable. Yates, Darren // Australian PC User;Mar2004, Vol. 16 Issue 3, p12 

    Looks into the events that would make 2004 the year for DVD. Drop in the prices of DVD burners; Abundance of free software for downloading DVD movies; Increase in the production of standalone DVD players that support the DivX MPEG-4 compression codec; Announcement of a new standard for...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics