| Publication | Date of Publication | Type |
|---|
A dynamic secret sharing scheme with cheater detection | 2024-07-11 | Paper |
A group-oriented \((t, n)\) undeniable signature scheme without trusted center | 2024-07-11 | Paper |
Connected proper interval graphs and the guard problem in spiral polygons (extended abstract) | 2024-07-05 | Paper |
A video watermark algorithm based on tensor decomposition Mathematical Biosciences and Engineering | 2022-08-03 | Paper |
High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting Mathematical Biosciences and Engineering | 2022-08-03 | Paper |
AMBTC based high payload data hiding with modulo-2 operation and Hamming code Mathematical Biosciences and Engineering | 2021-08-13 | Paper |
An improved integer transform combining with an irregular block partition Symmetry | 2019-11-13 | Paper |
Real-time error-free reversible data hiding in encrypted images using \((7,4)\) Hamming code and most significant bit prediction Symmetry | 2019-11-13 | Paper |
An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials Symmetry | 2019-11-13 | Paper |
Some active attacks on fast server-aided secret computation protocols for modular exponentiation Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
Public audit for operation behavior logs with error locating in cloud storage Soft Computing | 2019-08-14 | Paper |
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting IEEE Transactions on Image Processing | 2017-11-20 | Paper |
Image sharing with steganography and authentication | 2017-07-11 | Paper |
Authenticated encryption schemes with linkage between message blocks Information Processing Letters | 2016-06-01 | Paper |
A simple approach for generating RSA keys Information Processing Letters | 2016-05-26 | Paper |
scientific article; zbMATH DE number 6499824 (Why is no real title available?) | 2015-10-28 | Paper |
scientific article; zbMATH DE number 6499850 (Why is no real title available?) | 2015-10-28 | Paper |
Provably secure three party encrypted key exchange scheme with explicit authentication Information Sciences | 2015-09-23 | Paper |
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy Fundamenta Informaticae | 2014-05-12 | Paper |
Chaotic maps-based password-authenticated key agreement using smart cards Communications in Nonlinear Science and Numerical Simulation | 2014-01-08 | Paper |
High capacity SMVQ-based hiding scheme using adaptive index Signal Processing | 2010-08-06 | Paper |
A data hiding method for text documents using multiple-base encoding Communications in Computer and Information Science | 2010-06-15 | Paper |
Lossless image compression based on multiple-tables arithmetic coding Mathematical Problems in Engineering | 2009-11-13 | Paper |
Removing blocking effects using an artificial neural network Signal Processing | 2009-10-29 | Paper |
scientific article; zbMATH DE number 5619711 (Why is no real title available?) | 2009-10-22 | Paper |
Computing Lucas functions using addition chains. | 2009-10-22 | Paper |
scientific article; zbMATH DE number 5617432 (Why is no real title available?) | 2009-10-16 | Paper |
An on-line electronic check system with mutual authentication Computers and Electrical Engineering | 2009-10-15 | Paper |
Attacks on provably secure proxy-protected signature schemes based on factoring Journal of Discrete Mathematical Sciences and Cryptography | 2009-07-14 | Paper |
Robust non-interactivet-out-of-noblivious transfer based on the RSA cryptosystem Journal of Discrete Mathematical Sciences and Cryptography | 2009-07-14 | Paper |
Preventing Cheating in Computational Visual Cryptography Fundamenta Informaticae | 2009-06-30 | Paper |
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique Fundamenta Informaticae | 2009-06-23 | Paper |
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes Fundamenta Informaticae | 2009-05-22 | Paper |
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns Fundamenta Informaticae | 2009-05-22 | Paper |
A lossless data embedding technique by joint neighboring coding Pattern Recognition | 2009-05-07 | Paper |
Authors reply ``Sharing secrets in stego images with authentication Pattern Recognition | 2009-05-07 | Paper |
Distortion-free secret image sharing mechanism using modulus operator Pattern Recognition | 2009-04-03 | Paper |
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce Information Sciences | 2009-03-25 | Paper |
A New (t,n) −Threshold Scheme Based on Difference Equations Combinatorics, Algorithms, Probabilistic and Experimental Methodologies | 2009-03-03 | Paper |
High capacity data hiding for grayscale image | 2009-02-12 | Paper |
A large payload data embedding technique for color images | 2009-02-12 | Paper |
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control Information Security and Cryptology | 2009-02-10 | Paper |
A mutual authenticated key agreement scheme over insecure networks Journal of Discrete Mathematical Sciences and Cryptography | 2008-12-11 | Paper |
A novel cryptographic key assignment scheme with ID-based access control in a hierachy | 2008-11-17 | Paper |
A color image watermarking scheme based on color quantization Signal Processing | 2008-10-16 | Paper |
Sharing secrets in stego images with authentication Pattern Recognition | 2008-08-13 | Paper |
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity Pattern Recognition | 2008-08-13 | Paper |
A novel group signature scheme based on bilinear pairings and gap Diffie-Hellman group | 2008-07-21 | Paper |
Lossless data hiding for color images based on block truncation coding Pattern Recognition | 2008-05-09 | Paper |
A concealed \(t\)-out-of-\(n\) signer ambigous signature scheme with variety of keys | 2008-04-29 | Paper |
Three-phase lossless data hiding method for the VQ index table | 2008-03-19 | Paper |
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognition | 2007-11-07 | Paper |
A new \(t\)-out-\(n\) oblivious transfer with low bandwidth | 2007-10-30 | Paper |
A novel identity-based society oriented signature scheme with anonymous signers | 2007-10-29 | Paper |
Security enhancement of key authentication schemes based on discrete logarithms Journal of Discrete Mathematical Sciences and Cryptography | 2007-10-22 | Paper |
Security enhancement for digital signature schemes with fault tolerance in RSA Information Sciences | 2007-10-10 | Paper |
Comments on e-mail protocols providing forward secrecy Journal of Discrete Mathematical Sciences and Cryptography | 2007-09-18 | Paper |
An efficient ID-based user identification scheme for mutual authentication in mobile environments Journal of Discrete Mathematical Sciences and Cryptography | 2007-09-18 | Paper |
Comments on WLT attack on an enhanced timestamp-based password authentication scheme Journal of Discrete Mathematical Sciences and Cryptography | 2007-09-18 | Paper |
Security enhancement of Yang-Li hierarchical access control mechanism Journal of Discrete Mathematical Sciences and Cryptography | 2007-09-18 | Paper |
An image retrieval method based on color-complexity and spatial-histogram features | 2007-07-24 | Paper |
Secret image hiding and sharing based on the \((t,n)\)-threshold | 2007-07-24 | Paper |
Security enhancement of an IC-card-based remote login mechanism Computer Networks | 2007-06-04 | Paper |
Similar image retrieval based on wavelet transformation | 2007-05-10 | Paper |
Full-searching equivalent vector quantization method using two-bounds triangle inequality | 2007-04-02 | Paper |
Tolerant key assignment for enforcing complicated access control policies in a hierarchy | 2007-04-02 | Paper |
A \((t, n)\) threshold secret sharing system with efficient identification of cheaters | 2007-03-07 | Paper |
scientific article; zbMATH DE number 5117073 (Why is no real title available?) | 2007-01-19 | Paper |
A parallel residue-to-binary conversion algorithm without trial division Computers and Electrical Engineering | 2007-01-09 | Paper |
An efficient image authentication method based on Hamming code Pattern Recognition | 2006-12-07 | Paper |
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels Pattern Recognition | 2006-08-14 | Paper |
A novel index coding scheme for vector quantization | 2006-08-03 | Paper |
Perfect hashing schemes for mining traversal patterns | 2006-07-26 | Paper |
An improved tree-structured codebook search algorithm for grayscale image compression | 2006-07-26 | Paper |
scientific article; zbMATH DE number 5042676 (Why is no real title available?) | 2006-07-26 | Paper |
An anonymous and flexible í-out-of-n electronic voting scheme Journal of Discrete Mathematical Sciences and Cryptography | 2006-06-19 | Paper |
scientific article; zbMATH DE number 5033856 (Why is no real title available?) | 2006-06-19 | Paper |
Data compressor for VQ index tables | 2006-06-19 | Paper |
An inverse halftoning technique using modified look-up tables | 2006-06-19 | Paper |
scientific article; zbMATH DE number 5033822 (Why is no real title available?) | 2006-06-19 | Paper |
A novel efficient \((t,n)\) threshold proxy signature scheme Information Sciences | 2006-05-16 | Paper |
A division algorithm for residue numbers Applied Mathematics and Computation | 2006-04-28 | Paper |
An iterative modular multiplication algorithm in RNS Applied Mathematics and Computation | 2006-02-07 | Paper |
Schemes for digital gift certificates with low computation complexity | 2006-01-24 | Paper |
scientific article; zbMATH DE number 2231115 (Why is no real title available?) | 2005-11-21 | Paper |
A time-stamping protocol for digital watermarking Applied Mathematics and Computation | 2005-11-14 | Paper |
Authentication schemes with no verification table Applied Mathematics and Computation | 2005-10-28 | Paper |
SIMILAR IMAGE RETRIEVAL BASED ON WAVELET TRANSFORMATION International Journal of Wavelets, Multiresolution and Information Processing | 2005-09-27 | Paper |
The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain Designs, Codes and Cryptography | 2005-08-17 | Paper |
A scheme for threshold multi-secret sharing Applied Mathematics and Computation | 2005-08-05 | Paper |
scientific article; zbMATH DE number 2188487 (Why is no real title available?) | 2005-07-26 | Paper |
scientific article; zbMATH DE number 2188492 (Why is no real title available?) | 2005-07-26 | Paper |
scientific article; zbMATH DE number 2158222 (Why is no real title available?) | 2005-04-18 | Paper |
scientific article; zbMATH DE number 2158223 (Why is no real title available?) | 2005-04-18 | Paper |
scientific article; zbMATH DE number 2147849 (Why is no real title available?) | 2005-03-21 | Paper |
scientific article; zbMATH DE number 2140442 (Why is no real title available?) | 2005-03-03 | Paper |
scientific article; zbMATH DE number 2140430 (Why is no real title available?) | 2005-03-03 | Paper |
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli Applied Mathematics and Computation | 2005-02-22 | Paper |
Digital signature with message recovery using self-certified public keys without trustworthy system authority Applied Mathematics and Computation | 2005-02-22 | Paper |
A high-speed division algorithm in residue number system using parity-checking technique International Journal of Computer Mathematics | 2005-01-14 | Paper |
scientific article; zbMATH DE number 2124283 (Why is no real title available?) | 2005-01-03 | Paper |
scientific article; zbMATH DE number 2118903 (Why is no real title available?) | 2004-11-25 | Paper |
scientific article; zbMATH DE number 2118906 (Why is no real title available?) | 2004-11-25 | Paper |
scientific article; zbMATH DE number 2118907 (Why is no real title available?) | 2004-11-25 | Paper |
scientific article; zbMATH DE number 2114210 (Why is no real title available?) | 2004-11-05 | Paper |
scientific article; zbMATH DE number 2113983 (Why is no real title available?) | 2004-11-05 | Paper |
scientific article; zbMATH DE number 2112192 (Why is no real title available?) | 2004-10-28 | Paper |
scientific article; zbMATH DE number 2112219 (Why is no real title available?) | 2004-10-28 | Paper |
scientific article; zbMATH DE number 2112202 (Why is no real title available?) | 2004-10-28 | Paper |
PARALLEL COMPUTATION OF THE MODULAR CASCADE EXPONENTIATION Parallel Algorithms and Applications | 2004-10-06 | Paper |
scientific article; zbMATH DE number 2104055 (Why is no real title available?) | 2004-09-28 | Paper |
scientific article; zbMATH DE number 2080674 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2080675 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2066187 (Why is no real title available?) | 2004-05-18 | Paper |
Parallel computational algorithms for generalized Chinese remainder theorem. Computers and Electrical Engineering | 2004-03-14 | Paper |
scientific article; zbMATH DE number 2042265 (Why is no real title available?) | 2004-02-15 | Paper |
scientific article; zbMATH DE number 2040842 (Why is no real title available?) | 2004-02-11 | Paper |
scientific article; zbMATH DE number 2036445 (Why is no real title available?) | 2004-02-02 | Paper |
scientific article; zbMATH DE number 2036441 (Why is no real title available?) | 2004-02-02 | Paper |
scientific article; zbMATH DE number 2036485 (Why is no real title available?) | 2004-02-02 | Paper |
scientific article; zbMATH DE number 2036467 (Why is no real title available?) | 2004-02-02 | Paper |
scientific article; zbMATH DE number 2030032 (Why is no real title available?) | 2004-01-20 | Paper |
scientific article; zbMATH DE number 2006812 (Why is no real title available?) | 2003-11-23 | Paper |
scientific article; zbMATH DE number 1990806 (Why is no real title available?) | 2003-10-13 | Paper |
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking The Computer Journal | 2003-08-07 | Paper |
A steganographic method based upon JPEG and quantization table modification Information Sciences | 2003-06-25 | Paper |
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images Real-Time Imaging | 2003-04-03 | Paper |
A threshold decryption scheme without session keys Computers and Electrical Engineering | 2003-02-20 | Paper |
Image matching using run-length feature Pattern Recognition Letters | 2003-02-20 | Paper |
A fast pixel mapping algorithm using principal component analysis Pattern Recognition Letters | 2003-02-11 | Paper |
Cryptanalysis of an encryption scheme for binary images Pattern Recognition Letters | 2003-02-11 | Paper |
A novel progressive modelling algorithm for 3D models The Journal of Visualization and Computer Animation | 2003-02-04 | Paper |
Error prevention and resilience of VQ encoded images Signal Processing | 2003-01-22 | Paper |
An efficient protocol for anonymous multicast and reception. Information Processing Letters | 2003-01-21 | Paper |
Two 2D search filters and their performance analyses International Journal of Computer Mathematics | 2002-12-19 | Paper |
scientific article; zbMATH DE number 1755972 (Why is no real title available?) | 2002-11-05 | Paper |
scientific article; zbMATH DE number 1810461 (Why is no real title available?) | 2002-09-30 | Paper |
A compact sparse matrix representation using random hash functions Data & Knowledge Engineering | 2002-07-29 | Paper |
A fast modular multiplication algorithm for calculating the product \(AB\) modulo \(N\) Information Processing Letters | 2002-07-25 | Paper |
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy Pattern Recognition Letters | 2002-06-27 | Paper |
A digital watermarking scheme using human visual effects Informatica (Ljubljana) | 2002-04-15 | Paper |
A technique for computing watermarks from digital images Informatica (Ljubljana) | 2001-10-01 | Paper |
A method for computing Lucas sequences Computers & Mathematics with Applications | 2001-07-15 | Paper |
A virtual image cryptosystem based upon vector quantization IEEE Transactions on Image Processing | 2000-09-06 | Paper |
A multichannel storage arrangement scheme of pictorial databases for concurrent spatial match retrieval Computers & Mathematics with Applications | 2000-07-09 | Paper |
scientific article; zbMATH DE number 1294069 (Why is no real title available?) | 2000-06-14 | Paper |
scientific article; zbMATH DE number 1445807 (Why is no real title available?) | 2000-05-10 | Paper |
scientific article; zbMATH DE number 1229523 (Why is no real title available?) | 1999-05-05 | Paper |
A bin-tree oriented iconic indexing scheme for retrieving symbolic pictures Data & Knowledge Engineering | 1998-08-13 | Paper |
A parallel two-list algorithm for the knapsack problem Parallel Computing | 1998-07-23 | Paper |
Some properties of optimal cartesian product files for orthogonal range queries Information Sciences | 1998-02-25 | Paper |
scientific article; zbMATH DE number 1186876 (Why is no real title available?) | 1998-01-01 | Paper |
scientific article; zbMATH DE number 1085405 (Why is no real title available?) | 1997-12-15 | Paper |
A secure voting system on a public network | 1997-11-25 | Paper |
scientific article; zbMATH DE number 1085400 (Why is no real title available?) | 1997-11-12 | Paper |
Proper interval graphs and the guard problem Discrete Mathematics | 1997-08-10 | Paper |
Parallel computation of the multi-exponentiation for cryptosystems International Journal of Computer Mathematics | 1997-06-30 | Paper |
scientific article; zbMATH DE number 966906 (Why is no real title available?) | 1997-05-11 | Paper |
Authenticated encryption schemes with message linkage Information Processing Letters | 1997-02-27 | Paper |
Integrating authentication in public key distribution system Information Processing Letters | 1997-02-27 | Paper |
Efficient cheater identification method for threshold schemes IEE Proceedings - Computers and Digital Techniques | 1997-01-01 | Paper |
Some properties of vectorial addition chains† International Journal of Computer Mathematics | 1996-05-28 | Paper |
Arithmetic operations on encrypted data International Journal of Computer Mathematics | 1996-05-01 | Paper |
scientific article; zbMATH DE number 761918 (Why is no real title available?) | 1995-06-08 | Paper |
Controlling access in tree hierarchies Information Sciences | 1995-02-05 | Paper |
An authentication-combined access control scheme using a one-way function Computers & Mathematics with Applications | 1994-10-04 | Paper |
A refinement of a compression-oriented addressing scheme BIT | 1994-03-22 | Paper |
Optimal MMI file systems for orthogonal range retrieval Information Systems | 1994-01-31 | Paper |
Algebraic operations on encrypted relational databases Information Systems | 1994-01-31 | Paper |
Using smart cards to authenticate remote passwords Computers & Mathematics with Applications | 1994-01-06 | Paper |
Access control in a hierarchy using a one-way trap door function Computers & Mathematics with Applications | 1994-01-06 | Paper |
On GDM allocation method for partial range queries Information Systems | 1993-12-20 | Paper |
A fast algorithm to retrieve symbolic pictures International Journal of Computer Mathematics | 1993-01-16 | Paper |
A password authentication scheme based on discrete logarithms International Journal of Computer Mathematics | 1992-06-28 | Paper |
scientific article; zbMATH DE number 30297 (Why is no real title available?) | 1992-06-27 | Paper |
A note on allocating k-ary multiple key hashing files among multiple disks Information Sciences | 1991-01-01 | Paper |
A reciprocal confluence tree unit and its applications BIT | 1990-01-01 | Paper |
Application of principal component analysis to multi-disk concurrent accessing BIT | 1988-01-01 | Paper |
Short notes: A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files The Computer Journal | 1988-01-01 | Paper |
An Information Protection Scheme Based upon Number Theory The Computer Journal | 1987-01-01 | Paper |
An Information Protection Scheme Based upon Number Theory The Computer Journal | 1987-01-01 | Paper |
On the design of a key-lock-pair mechanism in information protection systems BIT | 1986-01-01 | Paper |
A scheme for constructing ordered minimal perfect hashing functions Information Sciences | 1986-01-01 | Paper |
A Letter-oriented Minimal Perfect Hashing Scheme The Computer Journal | 1986-01-01 | Paper |
Query Processing in a Fragmented Relational Distributed System: Mermaid IEEE Transactions on Software Engineering | 1985-01-01 | Paper |
scientific article; zbMATH DE number 3900188 (Why is no real title available?) | 1984-01-01 | Paper |
Performance Analyses of Cartesian Product Files and Random Files IEEE Transactions on Software Engineering | 1984-01-01 | Paper |
An ordered minimal perfect hashing scheme based upon Euler's theorem Information Sciences | 1984-01-01 | Paper |
Optimal information retrieval when queries are not random Information Sciences | 1984-01-01 | Paper |
The hierarchical ordering in multiattribute files Information Sciences | 1983-01-01 | Paper |
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries IEEE Transactions on Software Engineering | 1982-01-01 | Paper |