Author of the publication

A New Fingerprinting Codes for Multimedia Contents.

, , , and . MMM (2), volume 4352 of Lecture Notes in Computer Science, page 510-519. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Design of the Hash Functions With All-or-Nothing Property., and . J. Inf. Sci. Eng., 17 (6): 945-957 (2001)Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services., , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 437-443. Springer, (2015)DRM Cloud Architecture and Service Scenario for Content Protection., , and . J. Internet Serv. Inf. Secur., 3 (3/4): 94-105 (2013)Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage., , , and . Wirel. Commun. Mob. Comput., (2019)A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange., , , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 353-358. Springer, (2018)All-or-Nothing Transform and Remotely Keyed Encription Protocols., , and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 178-195. Springer, (2000)An Image Steganography Using Pixel Characteristics., , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 581-588. Springer, (2005)Intelligent Access Control Mechanism for Ubiquitous Applications., and . ACIS-ICIS, page 955-960. IEEE Computer Society, (2007)Design and implementation of E-discovery as a service based on cloud computing., , , and . Comput. Sci. Inf. Syst., 10 (2): 703-724 (2013)A Simplified Approach to User Controllable Threshold Signatures., , and . CEC, page 273-280. IEEE Computer Society, (2004)