Author of the publication

Predictive pixel differencing expansion in data reversibility scheme.

, , , and . ICUIMC, page 17:1-17:7. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments., , , , and . MobiQuitous (Adjunct Proceedings), page 88-93. ACM, (2016)Comments on Hwang-Lee-Lai Attack upon Fan-Lei Partially Blind Signature Scheme.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (7): 1900-1901 (2003)Robust remote authentication scheme with smart cards., , and . Comput. Secur., 24 (8): 619-628 (2005)Randomization enhanced Chaum's blind signature scheme., , and . Comput. Commun., 23 (17): 1677-1680 (2000)Buyer-seller watermarking protocols with off-line trusted third parties., , and . Int. J. Ad Hoc Ubiquitous Comput., 4 (1): 36-43 (2009)WeisoEvent: A Ming-Weiso Event Analytics Tool with Named Entity Markup and Spatial-Temporal Information Linking., , , , , and . DH, Alliance of Digital Humanities Organizations (ADHO), (2017)Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map., , and . AsiaJCIS, page 9-15. IEEE, (2020)Automatic Labeled Data Generation for Person Named Entity Disambiguation on the Ming Shilu., , , and . DH, (2020)An Efficient Secure Handover Scheme Supporting Cross-Network Slicing for Multi-Operator Environments., , , , and . ICMU, page 1-7. IEEE, (2021)Clustering-Based Network Intrusion Detection System., , and . DSC, page 1-8. IEEE, (2022)