From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reversible Data Hiding Scheme Based on Image Inpainting., , , и . Fundam. Informaticae, 120 (1): 59-70 (2012)A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper)., , , и . J. Commun., 5 (1): 5-12 (2010)A Novel Proactive Multi-secret Sharing Scheme., , , и . Int. J. Netw. Secur., 17 (2): 123-128 (2015)A Verifiable E-voting Scheme with Secret Sharing., , , , и . Int. J. Netw. Secur., 19 (2): 260-271 (2017)Sharing a Secret Image in Binary Images with Verification., , , и . J. Inf. Hiding Multim. Signal Process., (2011)A reversible information hiding scheme using left-right and up-down chinese character representation., , , и . J. Syst. Softw., 82 (8): 1362-1369 (2009)A high-performance reversible data-hiding scheme for LZW codes., , , и . J. Syst. Softw., 86 (11): 2771-2778 (2013)Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows., , , и . IIH-MSP, стр. 324-327. IEEE Computer Society, (2009)Performance Analysis for Content Distribution in Crowdsourced Content-Centric Mobile Networking., , , , и . QSHINE, том 234 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 131-141. Springer, (2017)Secure Key Transfer Protocol Based on Secret Sharing for Group Communications., , , и . IEICE Trans. Inf. Syst., 94-D (11): 2069-2076 (2011)