Found: 13
Select item for more details and to access through your institution.
Efficient Identity-Based Generalized Ring Signcryption Scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 12, p. 5553, doi. 10.3837/tiis.2016.12.022
- By:
- Publication type:
- Article
Reversible Watermarking with Adaptive Embedding Threshold Matrix.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 9, p. 4603, doi. 10.3837/tiis.2016.09.031
- By:
- Publication type:
- Article
Visual object tracking with discriminative correlation filtering and hybrid color feature.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 24, p. 34725, doi. 10.1007/s11042-019-07901-w
- By:
- Publication type:
- Article
Bessel-Fourier moment-based robust image zero-watermarking.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 3, p. 841, doi. 10.1007/s11042-013-1701-8
- By:
- Publication type:
- Article
Composite chaos-based lossless image authentication and tamper localization.
- Published in:
- Multimedia Tools & Applications, 2013, v. 63, n. 3, p. 947, doi. 10.1007/s11042-012-1329-0
- By:
- Publication type:
- Article
A novel watermarking scheme for authenticating individual data integrity of WSNs.
- Published in:
- KSII Transactions on Internet & Information Systems, 2023, v. 17, n. 3, p. 938, doi. 10.3837/tiis.2023.03.014
- By:
- Publication type:
- Article
Simultaneously Toughening and Reinforcing Polylactide by Regulating the Distribution of Core–Shell Rubber Particles with Carbon Black.
- Published in:
- Macromolecular Materials & Engineering, 2022, v. 307, n. 11, p. 1, doi. 10.1002/mame.202200338
- By:
- Publication type:
- Article
A MADM-based Handover Management in Software-defined 5G Network.
- Published in:
- Engineering Letters, 2019, v. 27, n. 4, p. 1
- By:
- Publication type:
- Article
Data Authentication for Wireless Sensor Networks with High Detection Efficiency Based on Reversible Watermarking.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/6651137
- By:
- Publication type:
- Article
Certificateless Signcryption in the Standard Model.
- Published in:
- Wireless Personal Communications, 2017, v. 92, n. 2, p. 495, doi. 10.1007/s11277-016-3554-8
- By:
- Publication type:
- Article
An Efficient Top-k Query Scheme Based on Multilayer Grouping.
- Published in:
- Technical Gazette / Tehnički Vjesnik, 2019, v. 26, n. 5, p. 1339, doi. 10.17559/TV-20190124092015
- By:
- Publication type:
- Article
An Efficient Feature Extraction Scheme for Mobile Anti-Shake in Augmented Reality.
- Published in:
- Technical Gazette / Tehnički Vjesnik, 2018, v. 25, n. 4, p. 1119, doi. 10.17559/TV-20180408120907
- By:
- Publication type:
- Article
Certificate-Based Generalized Ring Signcryption Scheme.
- Published in:
- International Journal of Foundations of Computer Science, 2018, v. 29, n. 6, p. 1063, doi. 10.1142/S0129054118500211
- By:
- Publication type:
- Article