Author of the publication

SPMD architecture for DSP-based data encryption communication system.

, , , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 166-174. SPIE, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Confinement by Isolation in Information Systems, , and . Journal of Computer Security, (2000)Lost at the Center of a Circle: A Failure Mode and Its Remedy in the Two-Step Weighted Least Squares Method., , , , , and . VTC Spring, page 1-5. IEEE, (2011)Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI., and . GLOBECOM, page 1-6. IEEE, (2009)Modeling and Checking the Security of DIFC System Configurations., and . SafeConfig, page 21-38. Springer, (2012)Evaluating Intrusion-Tolerant Certification Authority Systems., , and . Quality and Reliability Eng. Int., 28 (8): 825-841 (2012)An Opportunistic Protocol Employing Independent Codebooks for Bidirectional Cooperative Networks., , and . IEEE Trans. Vehicular Technology, 62 (2): 902-908 (2013)Rate-Based Watermark Traceback: A New Approach., , and . ISPEC, volume 6047 of Lecture Notes in Computer Science, page 172-186. Springer, (2010)A Statistical Spam Filtering Scheme Based on Grid Platform., , and . IFSA (2), volume 42 of Advances in Soft Computing, page 527-534. Springer, (2007)On the Unambiguous Distance of Multi-Carrier Phase Ranging with Random Hopped Frequencie., , , and . CoRR, (2017)Word graph based speech rcognition error correction by handwriting input., and . ICMI, page 339-346. ACM, (2006)