Abstract

Techniques described herein leverage compression schemes to provide partial targeted encryption of a stream of data. Key aspects of the transferred data are still protected, and low end devices benefit from less power consumption.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS