11. R. Lundin, S. Lindskog, A. Brunstrom, and S. Fischer-H
¨
ubner. Using guesswork as a mea-
sure for confidentiality of selectively encrypted messages. In Proceedings of the First Work-
shop on Quality of Protection (QoP 2005), September 15, 2005.
12. J. Meyer and F. Gadegast. Security mechanisms for multimedia data with the example
MPEG-I video, 1995. http://www.gadegast.de/frank/doc/secmeng.pdf.
13. Nautilus secure phone homepage. http://nautilus.berlios.de/, June 9, 2004.
14. C. P. Pfleeger and S. L. Pfleeger. Security in Computing. Prentice Hall, 3rd edition, 2003.
15. J. O. Pliam. Ciphers and their Products: Group Theory in Private Key Cryptography. PhD
thesis, University of Minnesota, Minnesota, USA, 1999.
16. M. Podesser, H. P. Schmidt, and A. Uhl. Selective bitplane encryption for secure transmis-
sion of image data in mobile environments. In Proceedings of the 5th IEEE Nordic Signal
Processing Symposium (NORSIG’02), Tromsø/Trondheim, Norway, October 4–6, 2002.
17. J. Postel. RFC 768: User datagram protocol, August 1980. Status: Standard.
18. J. Postel. RFC 793: Transmission control protocol, September 1981. Status: Standard.
19. P. A. Schneck and K. Schwan. Dynamic authentication for high-performance network appli-
cations. In Proceedings of the Sixth IEEE/IFIP International Workshop on Quality of Service
(IWQoS’98), Napa, California, USA, May 18–20, 1998.
20. H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. RFC 1889: RTP: A transport
protocol for real-time applications, January 1996. Status: Standard.
21. A. Servetti and J. C. De Martin. Perception-based selective encryption of G.729 speech.
In Proceedings of the 2002 IEEE Internatinal Conference on Acoustics, Speech, and Signal
Processing, volume 1, pages 621–624, Orlando, Florida, USA, May 13–17, 2002.
22. C. Shi and B. Bhargava. An efficient MPEG video encryption algorithm. In Proceed-
ings of the Workshop on Security in Large-Scale Distributed Systems, pages 381–386, West
Lafayette, Indiana, USA, October 20–22, 1998.
23. Sony Electronics. Passage: Freedom to choose, February 10 2003.
http://www.sonypassage.com/features.htm.
24. G. A. Spanos and T. B. Maples. Performance study of a selective encryption scheme for
security of networked, real-time video. In Proceedings of the 4th International Conference
on Computer Communications and Networks (ICCCN’95), pages 72–78, Las Vegas, Nevada,
USA, September 1995.
25. Speak Freely homepage. http://www.speakfreely.org/, June 9, 2004.
26. E. Spyropoulou, C. Ager, T. E. Levin, and C. E. Irvine. IPSec modulation for quality of
secuirty service. In Proceedings of the Third Annual International Systems Security En-
gineering Association Conference (2002 ISSEA Conference), Orlando, Florida, USA, Mars
2002.
27. R. R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina,
M. Kalla, L. Zhang, and V. Paxson. RFC 2960: Stream control transmission protocol, Octo-
ber 2000. Status: Standard.
28. L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceed-
ings of the ACM Multimedia 1996, pages 219–229, Boston, Massachusetts, USA, November
1996.
29. P. K. Yogender and H. H. Ali. Impacts of employing different security levels on qos para-
meters in virtual private networks. In Proceedings of the 24th IASTED International Multi-
Conferenceon on Parallel and Distributed Computing and Networks (PDCN), February 14–
16, 2006.