Author of the publication

Efficient and secure encryption schemes for JPEG2000.

, and . ICASSP (5), page 869-872. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Related-Cipher Attacks.. ICICS, volume 2513 of Lecture Notes in Computer Science, page 447-455. Springer, (2002)W-ART: Action Relation Transformer for Weakly-Supervised Temporal Action Localization., , , , , and . ICASSP, page 2195-2199. IEEE, (2022)Transtl: Spatial-Temporal Localization Transformer for Multi-Label Video Classification., , , , , and . ICASSP, page 1965-1969. IEEE, (2022)Worst-Case Analysis is Maximum-A-Posteriori Estimation., and . CoRR, (2023)An Intelligent Scheduling Access Privacy Protection Model of Electric Vehicle Based on 5G-V2X., , , , , and . Sci. Program., (2021)Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy., and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 276-290. Springer, (2007)Resynchronization Attacks on WG and LEX., and . FSE, volume 4047 of Lecture Notes in Computer Science, page 422-432. Springer, (2006)Cryptanalysis of the Stream Cipher ABC v2., and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 56-66. Springer, (2006)URFDS: Systematic discovery of Unvalidated Redirects and Forwards in web applications., and . CNS, page 697-698. IEEE, (2015)Learning Graph ODE for Continuous-Time Sequential Recommendation., , , , and . IEEE Trans. Knowl. Data Eng., 36 (7): 3224-3236 (July 2024)