From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Collusion Attack Strategy for Digital Fingerprinting., , , , и . IWDW, том 6526 из Lecture Notes in Computer Science, стр. 224-238. Springer, (2010)Secret Sharing Based Video Watermark Algorithm for Multiuser., , , и . IWDW, том 5450 из Lecture Notes in Computer Science, стр. 303-312. Springer, (2008)New real-time watermarking algorithm for compressed video in vlc domain., , и . ICIP, стр. 2171-2174. IEEE, (2004)Mimir: Term-distributed indexing and search for secret documents., , , , , и . CollaborateCom, стр. 1-9. ICST / IEEE, (2010)Proactive Replication and Search for Rare Objects in Unstructured Peer-to-Peer Networks., , , , и . WAIM, том 6184 из Lecture Notes in Computer Science, стр. 74-85. Springer, (2010)Role updating for assignments., , , и . SACMAT, стр. 89-98. ACM, (2010)Design and implementation of a distributed computing environment model for object-oriented networks programming., , и . Comput. Commun., 25 (5): 516-521 (2002)A Novel Secure Interoperation System., и . International Conference on Computational Science (2), том 4488 из Lecture Notes in Computer Science, стр. 808-814. Springer, (2007)A Semantic Search Conceptual Model and Application in Security Access Control., , , , и . ASWC, том 4185 из Lecture Notes in Computer Science, стр. 366-376. Springer, (2006)Community mining on dynamic weighted directed graphs., , , и . CIKM-CNIKM, стр. 11-18. ACM, (2009)