Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Water-Air Interface Imaging: Recovering the Images Distorted by Surface Waves via an Efficient Registration Algorithm., , , , and . Entropy, 24 (12): 1765 (December 2022)Concrete Multi-Type Defect Classification Algorithm Based on MSSMA-SVM., , , , and . Sensors, 22 (23): 9145 (2022)Group-Based Proxy Re-encryption Scheme., and . ICIC (1), volume 5754 of Lecture Notes in Computer Science, page 1025-1034. Springer, (2009)A Novel Verifier-Based Authenticated Key Agreement Protocol., , and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 1044-1050. Springer, (2007)Group-oriented Encryption Secure against Collude Attack., and . J. Convergence Inf. Technol., 3 (4): 47-53 (2008)Improved Group-Oriented Encryption for Group Communication., and . CSO (2), page 667-671. IEEE Computer Society, (2009)978-0-7695-3605-7.An ID-based group signature., , and . InfoSecu, page 229-230. ACM, (2004)Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery., , and . HCI (15), volume 4564 of Lecture Notes in Computer Science, page 124-133. Springer, (2007)Adaptive Stretching Method for Underwater Image Color Correction., and . IJPRAI, 32 (2): 1854001:1-1854001:14 (2018)Normalized Moment of Inertia-Based Detection Algorithm for Copy-Paste Image Tampering., , and . IJPRAI, 33 (6): 1954023:1-1954023:16 (2019)