From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On protecting the integrity of sensor data., , и . ICECS, стр. 902-905. IEEE, (2008)Voronoi-based Secure kNN Queries over Spatial Data at the Cloud., , , и . IIT, стр. 13-17. IEEE, (2018)Extending steganography payload capacity using the L*a*b* color space., , и . IIT, стр. 1-6. IEEE, (2018)Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach., и . Multimedia Tools Appl., 76 (6): 8627-8650 (2017)On the embedding limits of the discrete cosine transform., и . Multimedia Tools Appl., 75 (10): 5939-5957 (2016)A Survey on Using Blockchain in Trade Supply Chain Solutions., , и . IEEE Access, (2019)Customs-Based Distributed Risk Assessment Method., , и . PAAP, том 1163 из Communications in Computer and Information Science, стр. 417-429. Springer, (2019)FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers., , и . Pervasive Mob. Comput., (августа 2023)Managing multi-priority services in ubiquitous computing applications., , и . Int. J. Internet Protoc. Technol., 5 (3): 154-165 (2010)Achieving Stronger Compaction for DCT-Based Steganography: A Region-Growing Approach., , и . WorldCIST (2), том 1160 из Advances in Intelligent Systems and Computing, стр. 251-261. Springer, (2020)