Author of the publication

An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations.

, , and . CCNC, page 1124-1128. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable protection for MPEG-4 fine granularity scalability., , , and . IEEE Trans. Multim., 7 (2): 222-233 (2005)Security implications of password discretization for click-based graphical passwords., , , and . WWW, page 1581-1591. International World Wide Web Conferences Steering Committee / ACM, (2013)Compoweb: a component-oriented web architecture., , , , and . WWW, page 545-554. ACM, (2008)Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes., , , , , , , , and . NDSS, The Internet Society, (2023)Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks., , , and . CCNC, page 1097-1101. IEEE, (2008)Data embedding in audio: where do we stand., , and . ICASSP, page 2075. IEEE Computer Society, (1999)Image Coding by Folding., , and . ICIP (2), page 665-668. IEEE Computer Society, (1997)Multiresolution Video Watermarking Using Perceptual Models and Scene Segmentation., , and . ICIP (2), page 558-561. IEEE Computer Society, (1997)Detecting Malicious Web Links and Identifying Their Attack Types., , and . WebApps, USENIX Association, (2011)A Heuristic Framework to Detect Concurrency Vulnerabilities., , , , and . ACSAC, page 529-541. ACM, (2018)