From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient entire chaos-based scheme for deniable authentication, , и . Chaos, Solitons & Fractals, 23 (4): 1327--1331 (февраля 2005)First-principles calculation of Z2 topological invariants within the FP-LAPW formalism., , , , и . Comput. Phys. Commun., 183 (9): 1849-1859 (2012)Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks., , , , и . J. Netw. Comput. Appl., (2020)A Two-Step Approach for Longitudinal Registration of Retinal Images., , , и . J. Medical Syst., 40 (12): 277:1-277:13 (2016)Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain., , , , , и . Secur. Commun. Networks, (2018)Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization., , , , , и . Secur. Commun. Networks, 9 (1): 43-53 (2016)A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing., , и . Secur. Commun. Networks, (2018)Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol., , , , , и . Entropy, 21 (5): 518 (2019)Convolutional neural networks tamper detection and location based on fragile watermarking., , и . Appl. Intell., 53 (20): 24056-24067 (октября 2023)GLS coding based security solution to JPEG with the structure of aggregated compression and encryption., , , и . Commun. Nonlinear Sci. Numer. Simul., 19 (5): 1366-1374 (2014)