Encryption and Authentication of H.264 Video. Furht, B., editor In Encyclopedia of Multimedia, pages 205–205. Springer US, 2008. 00000Paper abstract bibtex MPEG-21 based Video Adaptation with Encryption and Authentication
@incollection{furht_encryption_2008-1,
title = {Encryption and {Authentication} of {H}.264 {Video}},
copyright = {©2008 Springer-Verlag},
isbn = {978-0-387-74724-8 978-0-387-78414-4},
url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_516},
abstract = {MPEG-21 based Video Adaptation with Encryption and Authentication},
language = {en},
urldate = {2016-05-03},
booktitle = {Encyclopedia of {Multimedia}},
publisher = {Springer US},
editor = {Furht, Borko},
year = {2008},
note = {00000},
pages = {205--205}
}
Downloads: 0
{"_id":"Q4j579pG3uJSshMwi","bibbaseid":"furht-encryptionandauthenticationofh264video-2008","authorIDs":[],"bibdata":{"bibtype":"incollection","type":"incollection","title":"Encryption and Authentication of H.264 Video","copyright":"©2008 Springer-Verlag","isbn":"978-0-387-74724-8 978-0-387-78414-4","url":"http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_516","abstract":"MPEG-21 based Video Adaptation with Encryption and Authentication","language":"en","urldate":"2016-05-03","booktitle":"Encyclopedia of Multimedia","publisher":"Springer US","editor":[{"propositions":[],"lastnames":["Furht"],"firstnames":["Borko"],"suffixes":[]}],"year":"2008","note":"00000","pages":"205–205","bibtex":"@incollection{furht_encryption_2008-1,\n\ttitle = {Encryption and {Authentication} of {H}.264 {Video}},\n\tcopyright = {©2008 Springer-Verlag},\n\tisbn = {978-0-387-74724-8 978-0-387-78414-4},\n\turl = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_516},\n\tabstract = {MPEG-21 based Video Adaptation with Encryption and Authentication},\n\tlanguage = {en},\n\turldate = {2016-05-03},\n\tbooktitle = {Encyclopedia of {Multimedia}},\n\tpublisher = {Springer US},\n\teditor = {Furht, Borko},\n\tyear = {2008},\n\tnote = {00000},\n\tpages = {205--205}\n}\n\n","editor_short":["Furht, B."],"key":"furht_encryption_2008-1","id":"furht_encryption_2008-1","bibbaseid":"furht-encryptionandauthenticationofh264video-2008","role":"editor","urls":{"Paper":"http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_516"},"downloads":0,"html":""},"bibtype":"incollection","biburl":"http://www.telemidia.puc-rio.br/~alan/files/all.bib","creationDate":"2020-03-03T14:08:15.069Z","downloads":0,"keywords":[],"search_terms":["encryption","authentication","264","video"],"title":"Encryption and Authentication of H.264 Video","year":2008,"dataSources":["jAxurbvLP8q5LTdLa"]}