Author of the publication

A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets.

. J. Inf. Sci. Eng., 7 (2): 173-186 (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proxy User Authentication Protocol Using Source-Based Image Morphing., , and . Comput. J., 58 (7): 1573-1584 (2015)Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels., and . IEEE Communications Letters, 11 (5): 443-445 (2007)Isolated items discarding strategy for discovering high utility itemsets., , and . Data Knowl. Eng., 64 (1): 198-217 (2008)Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems., , and . Comput. J., 35 (3): 299-305 (1992)High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting., , and . Multimedia Tools Appl., 72 (1): 417-435 (2014)Low complexity index-compressed vector quantization for image compression., and . IEEE Trans. Consumer Electronics, 45 (1): 219-224 (1999)On the Design of a Machine-Independent Perfect Hashing Scheme., , and . Comput. J., 34 (5): 469-474 (1991)Multi-round dynamic swap optimisation for table-based steganography., , and . IET Image Processing, 9 (12): 1073-1082 (2015)A Solution to Generalized Group Oriented Cryptography., and . SEC, volume A-15 of IFIP Transactions, page 265-275. North-Holland, (1992)Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications., and . IMECS, page 959-962. Newswood Limited, (2006)