The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020
DOI: 10.1155/2020/8868672
|View full text |Cite
|
Sign up to set email alerts
|

Mimic Encryption Box for Network Multimedia Data Security

Abstract: With the rapid development of the Internet, the security of network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic defense (CMD) approaches provide a new way to solve this problem. To enhance the security of network multimedia data, this paper proposes a mimic encryption box for network multimedia data security. The mimic encryption box can directly access the network where the multimedia device is located, automatically complete the negotiation, prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…Several challenges of DS methodologies have been discussed by Bernstein et al 5 Also, a fast and dynamic encryption algorithm for multimedia applications has been considered for the voice data and its associated security issues. 6…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Several challenges of DS methodologies have been discussed by Bernstein et al 5 Also, a fast and dynamic encryption algorithm for multimedia applications has been considered for the voice data and its associated security issues. 6…”
Section: Literature Surveymentioning
confidence: 99%
“…Several challenges of DS methodologies have been discussed by Bernstein et al 5 Also, a fast and dynamic encryption algorithm for multimedia applications has been considered for the voice data and its associated security issues. 6 Another important addition is the Diffie-Hellman protocol to ensure the exchange of a secret key between two parties. Entity authentication is one of the key objectives of these algorithms.…”
Section: Literature Surveymentioning
confidence: 99%