Found: 12
Select item for more details and to access through your institution.
Evaluation and development of solid waste management plan: a case of Seoul for past and future 10 years.
- Published in:
- Journal of Material Cycles & Waste Management, 2015, v. 17, n. 4, p. 673, doi. 10.1007/s10163-014-0294-2
- By:
- Publication type:
- Article
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 7, p. 3371, doi. 10.3837/tiis.2016.07.028
- By:
- Publication type:
- Article
An improved double image digital watermarking scheme using the position property.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 17, p. 7261, doi. 10.1007/s11042-014-1980-8
- By:
- Publication type:
- Article
Steganographic method based on interpolation and LSB substitution of digital images.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 6, p. 2143, doi. 10.1007/s11042-013-1832-y
- By:
- Publication type:
- Article
High-capacity index based data hiding method.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 6, p. 2179, doi. 10.1007/s11042-014-2081-4
- By:
- Publication type:
- Article
Data hiding using edge detector for scalable images.
- Published in:
- Multimedia Tools & Applications, 2014, v. 71, n. 3, p. 1455, doi. 10.1007/s11042-012-1293-8
- By:
- Publication type:
- Article
Cryptanalysis of a simple three-party password-based key exchange protocol.
- Published in:
- International Journal of Communication Systems, 2011, v. 24, n. 4, p. 532, doi. 10.1002/dac.1168
- By:
- Publication type:
- Article
An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.
- Published in:
- PLoS ONE, 2016, v. 11, n. 5, p. 1, doi. 10.1371/journal.pone.0154308
- By:
- Publication type:
- Article
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem.
- Published in:
- Journal of Supercomputing, 2013, v. 63, n. 1, p. 235, doi. 10.1007/s11227-010-0512-1
- By:
- Publication type:
- Article
Certificateless broadcast authentication for vehicular ad hoc networks.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 5, p. 602, doi. 10.1002/sec.590
- By:
- Publication type:
- Article
AN IMPROVED VIRTUAL 3D CA PRNG BASED ON MOORE NEIGHBORHOOD METHOD.
- Published in:
- Journal of Circuits, Systems & Computers, 2010, v. 19, n. 1, p. 75, doi. 10.1142/S0218126610006013
- By:
- Publication type:
- Article
Nonlinear secret image sharing scheme.
- Published in:
- 2014
- By:
- Publication type:
- journal article