From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proxy User Authentication Protocol Using Source-Based Image Morphing., , и . Comput. J., 58 (7): 1573-1584 (2015)Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels., и . IEEE Communications Letters, 11 (5): 443-445 (2007)Isolated items discarding strategy for discovering high utility itemsets., , и . Data Knowl. Eng., 64 (1): 198-217 (2008)Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems., , и . Comput. J., 35 (3): 299-305 (1992)High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting., , и . Multimedia Tools Appl., 72 (1): 417-435 (2014)Low complexity index-compressed vector quantization for image compression., и . IEEE Trans. Consumer Electronics, 45 (1): 219-224 (1999)On the Design of a Machine-Independent Perfect Hashing Scheme., , и . Comput. J., 34 (5): 469-474 (1991)Multi-round dynamic swap optimisation for table-based steganography., , и . IET Image Processing, 9 (12): 1073-1082 (2015)A Solution to Generalized Group Oriented Cryptography., и . SEC, том A-15 из IFIP Transactions, стр. 265-275. North-Holland, (1992)Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications., и . IMECS, стр. 959-962. Newswood Limited, (2006)