최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, v.9 no.12, 2020년, pp.307 - 314
김정석 (서울시립대학교 전자전기컴퓨터공학부) , 이재호 (서울시립대학교 전자전기컴퓨터공학부)
The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the serv...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
D. C. Latham, "Department of defense trusted computer system evaluation criteria. Department of Defense," 1986.
Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An overview of blockchain technology: Architecture, consensus, and future trends," 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, pp.557-564, 2017.
G. Zyskind, O. Nathan, and A. Pentland, "Decentralizing privacy: Using blockchain to protect personal data," In 2015 IEEE Security and Privacy Workshops, pp.180-184, May 2015.
ISO/IEC 23001-7:2016, Part 7: Common encryption in ISO base media file format files In Information technology - MPEG systems technologies Retrieved from https://www.iso.org/standard/68042.html
Alka Vishwa and Farookh Hussain, "A blockchain based approach for multimedia privacy protection and provenance," In 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp.1941-1945, Nov. 2018.
R. Wang, J. He, C. Liu, Q. Li, W. Tsai, and E. Deng, "A privacy-aware PKI system based on permissioned blockchains," In 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), pp.928-931, Nov. 2018.
A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, "Medrec: Using blockchain for medical data access and permission management," In 2016 2nd International Conference on Open and Big Data (OBD), pp.25-30, Aug. 2016.
X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla, "Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability," In 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp.468-477, May 2017.
P. Patila, P. Narayankar, N. D G and M. S M, "A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish," Procedia Computer Science, Vol.78, pp.617-624, 2016.
Microsoft Stream Video Delivery and Network Overview [Internet], https://docs.microsoft.com/en-us/stream/network-overview
※ AI-Helper는 부적절한 답변을 할 수 있습니다.