Publication | Date of Publication | Type |
---|
A video watermark algorithm based on tensor decomposition | 2022-08-03 | Paper |
High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting | 2022-08-03 | Paper |
AMBTC based high payload data hiding with modulo-2 operation and Hamming code | 2021-08-13 | Paper |
An improved integer transform combining with an irregular block partition | 2019-11-13 | Paper |
Real-time error-free reversible data hiding in encrypted images using \((7,4)\) Hamming code and most significant bit prediction | 2019-11-13 | Paper |
An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials | 2019-11-13 | Paper |
Some active attacks on fast server-aided secret computation protocols for modular exponentiation | 2019-10-10 | Paper |
Public audit for operation behavior logs with error locating in cloud storage | 2019-08-14 | Paper |
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting | 2017-11-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q5271446 | 2017-07-11 | Paper |
Authenticated encryption schemes with linkage between message blocks | 2016-06-01 | Paper |
A simple approach for generating RSA keys | 2016-05-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3448018 | 2015-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3448070 | 2015-10-28 | Paper |
Provably secure three party encrypted key exchange scheme with explicit authentication | 2015-09-23 | Paper |
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy | 2014-05-12 | Paper |
Chaotic maps-based password-authenticated key agreement using smart cards | 2014-01-08 | Paper |
High capacity SMVQ-based hiding scheme using adaptive index | 2010-08-06 | Paper |
A Data Hiding Method for Text Documents Using Multiple-Base Encoding | 2010-06-15 | Paper |
Lossless image compression based on multiple-tables arithmetic coding | 2009-11-13 | Paper |
Removing blocking effects using an artificial neural network | 2009-10-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q3184918 | 2009-10-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q3184919 | 2009-10-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q3183075 | 2009-10-16 | Paper |
An on-line electronic check system with mutual authentication | 2009-10-15 | Paper |
Robust non-interactivet-out-of-noblivious transfer based on the RSA cryptosystem | 2009-07-14 | Paper |
Attacks on provably secure proxy-protected signature schemes based on factoring | 2009-07-14 | Paper |
Preventing Cheating in Computational Visual Cryptography | 2009-06-30 | Paper |
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique | 2009-06-23 | Paper |
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes | 2009-05-22 | Paper |
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns | 2009-05-22 | Paper |
A lossless data embedding technique by joint neighboring coding | 2009-05-07 | Paper |
Authors reply ``Sharing secrets in stego images with authentication | 2009-05-07 | Paper |
Distortion-free secret image sharing mechanism using modulus operator | 2009-04-03 | Paper |
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce | 2009-03-25 | Paper |
A New (t,n) −Threshold Scheme Based on Difference Equations | 2009-03-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3601844 | 2009-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3601884 | 2009-02-12 | Paper |
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control | 2009-02-10 | Paper |
A mutual authenticated key agreement scheme over insecure networks | 2008-12-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3536082 | 2008-11-17 | Paper |
A color image watermarking scheme based on color quantization | 2008-10-16 | Paper |
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity | 2008-08-13 | Paper |
Sharing secrets in stego images with authentication | 2008-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q3512794 | 2008-07-21 | Paper |
Lossless data hiding for color images based on block truncation coding | 2008-05-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q5459551 | 2008-04-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q5450107 | 2008-03-19 | Paper |
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery | 2007-11-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q5422821 | 2007-10-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q5422591 | 2007-10-29 | Paper |
Security enhancement of key authentication schemes based on discrete logarithms | 2007-10-22 | Paper |
Security enhancement for digital signature schemes with fault tolerance in RSA | 2007-10-10 | Paper |
An efficient ID-based user identification scheme for mutual authentication in mobile environments | 2007-09-18 | Paper |
Comments on WLT attack on an enhanced timestamp-based password authentication scheme | 2007-09-18 | Paper |
Security enhancement of Yang-Li hierarchical access control mechanism | 2007-09-18 | Paper |
Comments on e-mail protocols providing forward secrecy | 2007-09-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q5294169 | 2007-07-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q5294173 | 2007-07-24 | Paper |
Security enhancement of an IC-card-based remote login mechanism | 2007-06-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q3437959 | 2007-05-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3429635 | 2007-04-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q3429636 | 2007-04-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q3424634 | 2007-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q3416079 | 2007-01-19 | Paper |
A parallel residue-to-binary conversion algorithm without trial division | 2007-01-09 | Paper |
An efficient image authentication method based on Hamming code | 2006-12-07 | Paper |
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels | 2006-08-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q5480655 | 2006-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q5480173 | 2006-07-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q5480175 | 2006-07-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q5480178 | 2006-07-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q5472860 | 2006-06-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q5472863 | 2006-06-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q5472889 | 2006-06-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q5472901 | 2006-06-19 | Paper |
An anonymous and flexible í-out-of-n electronic voting scheme | 2006-06-19 | Paper |
A novel efficient \((t,n)\) threshold proxy signature scheme | 2006-05-16 | Paper |
A division algorithm for residue numbers | 2006-04-28 | Paper |
An iterative modular multiplication algorithm in RNS | 2006-02-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q3367363 | 2006-01-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q5706672 | 2005-11-21 | Paper |
A time-stamping protocol for digital watermarking | 2005-11-14 | Paper |
Authentication schemes with no verification table | 2005-10-28 | Paper |
SIMILAR IMAGE RETRIEVAL BASED ON WAVELET TRANSFORMATION | 2005-09-27 | Paper |
The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain | 2005-08-17 | Paper |
A scheme for threshold multi-secret sharing | 2005-08-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q5461594 | 2005-07-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q5461600 | 2005-07-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4668061 | 2005-04-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4668062 | 2005-04-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4659514 | 2005-03-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4654266 | 2005-03-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4654278 | 2005-03-03 | Paper |
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli | 2005-02-22 | Paper |
Digital signature with message recovery using self-certified public keys without trustworthy system authority | 2005-02-22 | Paper |
A high-speed division algorithm in residue number system using parity-checking technique | 2005-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4831689 | 2005-01-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4828295 | 2004-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4828298 | 2004-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4828299 | 2004-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4825722 | 2004-11-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4825965 | 2004-11-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823644 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823659 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823687 | 2004-10-28 | Paper |
PARALLEL COMPUTATION OF THE MODULAR CASCADE EXPONENTIATION | 2004-10-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4818418 | 2004-09-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473570 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473571 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4462630 | 2004-05-18 | Paper |
Parallel computational algorithms for generalized Chinese remainder theorem. | 2004-03-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450034 | 2004-02-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4451948 | 2004-02-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4445966 | 2004-02-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4446346 | 2004-02-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4446384 | 2004-02-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4446420 | 2004-02-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4442173 | 2004-01-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4436109 | 2003-11-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4430979 | 2003-10-13 | Paper |
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking | 2003-08-07 | Paper |
A steganographic method based upon JPEG and quantization table modification | 2003-06-25 | Paper |
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images | 2003-04-03 | Paper |
Image matching using run-length feature | 2003-02-20 | Paper |
A threshold decryption scheme without session keys | 2003-02-20 | Paper |
A fast pixel mapping algorithm using principal component analysis | 2003-02-11 | Paper |
Cryptanalysis of an encryption scheme for binary images | 2003-02-11 | Paper |
A novel progressive modelling algorithm for 3D models | 2003-02-04 | Paper |
Error prevention and resilience of VQ encoded images | 2003-01-22 | Paper |
An efficient protocol for anonymous multicast and reception. | 2003-01-21 | Paper |
Two 2D search filters and their performance analyses | 2002-12-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4535759 | 2002-11-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3148289 | 2002-09-30 | Paper |
A compact sparse matrix representation using random hash functions | 2002-07-29 | Paper |
A fast modular multiplication algorithm for calculating the product \(AB\) modulo \(N\) | 2002-07-25 | Paper |
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy | 2002-06-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q2783263 | 2002-04-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q2730088 | 2001-10-01 | Paper |
A method for computing Lucas sequences | 2001-07-15 | Paper |
A virtual image cryptosystem based upon vector quantization | 2000-09-06 | Paper |
A multichannel storage arrangement scheme of pictorial databases for concurrent spatial match retrieval | 2000-07-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4246338 | 2000-06-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4952906 | 2000-05-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4222042 | 1999-05-05 | Paper |
A bin-tree oriented iconic indexing scheme for retrieving symbolic pictures | 1998-08-13 | Paper |
A parallel two-list algorithm for the knapsack problem | 1998-07-23 | Paper |
Some properties of optimal cartesian product files for orthogonal range queries | 1998-02-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840090 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4363824 | 1997-12-15 | Paper |
A secure voting system on a public network | 1997-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4363819 | 1997-11-12 | Paper |
Proper interval graphs and the guard problem | 1997-08-10 | Paper |
Parallel computation of the multi-exponentiation for cryptosystems | 1997-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q5690153 | 1997-05-11 | Paper |
Integrating authentication in public key distribution system | 1997-02-27 | Paper |
Authenticated encryption schemes with message linkage | 1997-02-27 | Paper |
Efficient cheater identification method for threshold schemes | 1997-01-01 | Paper |
Some properties of vectorial addition chains† | 1996-05-28 | Paper |
Arithmetic operations on encrypted data | 1996-05-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4835779 | 1995-06-08 | Paper |
Controlling access in tree hierarchies | 1995-02-05 | Paper |
An authentication-combined access control scheme using a one-way function | 1994-10-04 | Paper |
A refinement of a compression-oriented addressing scheme | 1994-03-22 | Paper |
Optimal MMI file systems for orthogonal range retrieval | 1994-01-31 | Paper |
Algebraic operations on encrypted relational databases | 1994-01-31 | Paper |
Using smart cards to authenticate remote passwords | 1994-01-06 | Paper |
Access control in a hierarchy using a one-way trap door function | 1994-01-06 | Paper |
On GDM allocation method for partial range queries | 1993-12-20 | Paper |
A fast algorithm to retrieve symbolic pictures | 1993-01-16 | Paper |
A password authentication scheme based on discrete logarithms | 1992-06-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3985345 | 1992-06-27 | Paper |
A note on allocating k-ary multiple key hashing files among multiple disks | 1991-01-01 | Paper |
A reciprocal confluence tree unit and its applications | 1990-01-01 | Paper |
Short notes: A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files | 1988-01-01 | Paper |
Application of principal component analysis to multi-disk concurrent accessing | 1988-01-01 | Paper |
An Information Protection Scheme Based upon Number Theory | 1987-01-01 | Paper |
An Information Protection Scheme Based upon Number Theory | 1987-01-01 | Paper |
A Letter-oriented Minimal Perfect Hashing Scheme | 1986-01-01 | Paper |
On the design of a key-lock-pair mechanism in information protection systems | 1986-01-01 | Paper |
A scheme for constructing ordered minimal perfect hashing functions | 1986-01-01 | Paper |
Query Processing in a Fragmented Relational Distributed System: Mermaid | 1985-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3678696 | 1984-01-01 | Paper |
An ordered minimal perfect hashing scheme based upon Euler's theorem | 1984-01-01 | Paper |
Optimal information retrieval when queries are not random | 1984-01-01 | Paper |
Performance Analyses of Cartesian Product Files and Random Files | 1984-01-01 | Paper |
The hierarchical ordering in multiattribute files | 1983-01-01 | Paper |
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries | 1982-01-01 | Paper |