Author of the publication

A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion.

, , , and . Neural Processing Letters, 24 (2): 93-105 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A forensic chip for secure digital video recording., and . ISCAS, page 3068-3071. IEEE, (2010)Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition., , and . IEEE Trans. Inf. Forensics Secur., (2020)Parameter estimation of chaotic systems by a nonlinear time-varying evolution PSO method., , , and . Artif. Life Robotics, 15 (1): 33-36 (2010)Development and behavioral pattern analysis of a mobile guide system with augmented reality for painting appreciation instruction in an art museum., , , , , and . Comput. Educ., (2014)Image recognition using adaptive fuzzy neural network based on lifting scheme of wavelet., and . Artif. Life Robotics, 20 (4): 353-358 (2015)Second-Generation RFID., , , , and . IEEE Secur. Priv., 6 (4): 21-27 (2008)Memoryless Hash-Based Perceptual Image Authentication., , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 425-434. Springer, (2012)Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks., and . Trans. Data Hiding Multim. Secur., (2015)A novel client service quality measuring model and an eHealthcare mitigating approach., , and . Int. J. Medical Informatics, (2016)An adaptive asteroid zonal filter for data compression., , and . Comput. Vis. Graph. Image Process., 34 (3): 292-301 (1986)