Author of the publication

On the Robustness of Visual Cryptographic Schemes.

, , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 251-262. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Intrusion Detection System at User Level with System-Call Interposing., and . ICETE (2), page 263-268. INSTICC Press, (2004)An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme., , and . WWW (Posters), (2003)A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository., and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 155-168. IOS Press, (2005)Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network., , , and . J. Networks, 7 (1): 88-100 (2012)Evaluation of a Zero-Watermarking-Type Steganography., , , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 613-624. Springer, (2014)A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks., , , , and . Comput. Commun., 35 (17): 2125-2137 (2012)Handling class Imbalance problem in Intrusion Detection System based on deep learning., , and . Int. J. Netw. Comput., 12 (2): 467-492 (2022)Botnet command and control based on Short Message Service and human mobility., and . Comput. Networks, 57 (2): 579-597 (2013)3-Party Adversarial Cryptography., , and . EIDWT, volume 47 of Lecture Notes on Data Engineering and Communications Technologies, page 247-258. Springer, (2020)Securing Provenance of Distributed Processes in an Untrusted Environment., , and . IEICE Trans. Inf. Syst., 95-D (7): 1894-1907 (2012)