Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Repeating Color Watermarking Scheme Based on Human Visual Model., and . EURASIP J. Adv. Signal Process., 2004 (13): 1965-1972 (2004)A New Micro-Payment System Using General Payword Chain., , and . Electron. Commer. Res., 2 (1-2): 159-168 (2002)Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU., , , , and . IEEE Internet of Things Journal, 6 (3): 4448-4461 (2019)Modified curvature scale space feature alignment approach for hand posture recognition., and . ICIP (3), page 309-312. IEEE, (2003)On Reliability of Multiprocessor System Based on Star Graph., , , , , and . IEEE Trans. Reliability, 69 (2): 715-724 (2020)A Novel Electronic English Auction System With a Secure On-Shelf Mechanism., , and . IEEE Trans. Inf. Forensics Secur., 8 (4): 657-668 (2013)Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing., , , , and . Wirel. Commun. Mob. Comput., (2018)An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network., , , , , , , and . MMM (2), volume 11962 of Lecture Notes in Computer Science, page 161-174. Springer, (2020)A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction., and . IIH-MSP, page 512-515. IEEE, (2014)A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks., and . IEEE Trans. Wirel. Commun., 15 (1): 357-366 (2016)