The following pages link to Shiuh-Jeng Wang (Q702582):
Displaying 17 items.
- Anonymous message communications with user hierarchy in a multicast system (Q702584) (← links)
- Two-tier authentication for cluster and individual sets in mobile ad hoc networks (Q858249) (← links)
- A dynamic access control scheme based upon the knapsack problem (Q1324377) (← links)
- Hierarchy-oriented searching algorithms using alternative duplicate codewords for vector quantization mechanism (Q1765803) (← links)
- Steganography of capacity required using modulo operator for embedding secret image (Q1774845) (← links)
- Threshold verification scheme to a valid-signature using identity only on specialized approval (Q1826788) (← links)
- (Q4484203) (← links)
- Private communications in hierarchical group-mobile radio system (Q4670757) (← links)
- Vowel-consonant addressing mode on hashing for English letter-oriented keys (Q4678474) (← links)
- (Q5271444) (← links)
- Procedural response and digital evidence exposure in information security incidents (Q5307740) (← links)
- Key management for Pay-TV broadcast systems in hierarchy (Q5307744) (← links)
- (Q5421185) (← links)
- Information hiding at oblivious watermarking scheme upon alternative thresold in spatial domains (Q5421201) (← links)
- (Q5447987) (← links)
- Weighted bipartite graph for locating optimal LSB substitution for secret embedding (Q5473101) (← links)
- (Q5754649) (← links)