Reference Hub24
Indices2
Handbook of Research on Secure Multimedia Distribution

Handbook of Research on Secure Multimedia Distribution

Copyright: © 2009 |Pages: 616
ISBN13: 9781605662626|ISBN10: 1605662623|EISBN13: 9781605662633
DOI: 10.4018/978-1-60566-262-6
Cite Book Cite Book

MLA

Lian, Shiguo, and Yan Zhang, editors. Handbook of Research on Secure Multimedia Distribution. IGI Global, 2009. https://doi.org/10.4018/978-1-60566-262-6

APA

Lian, S. & Zhang, Y. (Eds.). (2009). Handbook of Research on Secure Multimedia Distribution. IGI Global. https://doi.org/10.4018/978-1-60566-262-6

Chicago

Lian, Shiguo, and Yan Zhang, eds. Handbook of Research on Secure Multimedia Distribution. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-262-6

Export Reference

Mendeley
Favorite Full-Book Download

New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field.

The Handbook of Research on Secure Multimedia Distribution provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, and academicians interested or involved in the study, research, use, design, and development of techniques related to multimedia distribution.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Secure Distribution Systems
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Core Techniques  (pages 180-180)
Core Techniques
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Typical Applications  (pages 383-383)
Typical Applications
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.