Author of the publication

Architecture of a novel DRM system.

, , and . IASTED Conf. on Software Engineering, page 78-83. IASTED/ACTA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Progressive and multi-level secret image sharing scheme with hierarchical shadows., , , , and . Multim. Tools Appl., 81 (21): 31039-31059 (2022)Traceable Scheme of Public Key Encryption with Equality Test., , , and . Entropy, 24 (3): 309 (2022)FishStore: Fast Ingestion and Indexing of Raw Data., , , and . Proc. VLDB Endow., 12 (12): 1922-1925 (2019)Large Scale Spatial Data Management and Analysis.. University of Utah, USA, (2020)High-dimensional cryptographic quantum parameter estimation., , , and . Quantum Inf. Process., 17 (5): 116 (2018)Application of artificial intelligence in continuous emission monitoring system., , , and . IEEE ICCI*CC, page 461-464. IEEE Computer Society, (2017)Establishment and optimization of human skin charge modeling., , , , , and . IEEE ICCI*CC, page 444-449. IEEE Computer Society, (2017)Identifying Protein Complexes from PPI Networks Using GO Semantic Similarity., , , , and . BIBM, page 582-585. IEEE Computer Society, (2011)Deep Deterministic Policy Gradients with Transfer Learning Framework in StarCraft Micromanagement., and . EIT, page 410-415. IEEE, (2019)An Error Resilience Scheme for Packet Loss Recover of H.264 Video., , , and . PCM (2), volume 3332 of Lecture Notes in Computer Science, page 975-984. Springer, (2004)