Author of the publication

A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme.

, , , , , and . J. Inf. Secur. Appl., (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finite-Time Lag Synchronization of Memristive Neural Networks With Multi-Links via Adaptive Control., , , , and . IEEE Access, (2020)Adaptive synchronization of memristor-based BAM neural networks with mixed delays., , , and . Appl. Math. Comput., (2018)A secure and efficient mutual authentication scheme for session initiation protocol., , , and . Peer-to-Peer Netw. Appl., 9 (2): 449-459 (2016)Chaotic Ant Swarm., , , and . ICNC (3), page 446-450. IEEE Computer Society, (2007)Finite-time synchronization of memristor-based neural networks with mixed delays., , , , and . Neurocomputing, (2017)Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product., , , , , and . IEEE Access, (2019)Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks., , , and . KSII Trans. Internet Inf. Syst., 10 (3): 1273-1288 (2016)Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model., , , and . KSII Trans. Internet Inf. Syst., 10 (5): 2427-2445 (2016)Impact of Sudden Global Events on Cross-Field Research Cooperation., , , and . Inf., 12 (1): 26 (2021)An efficient secure data transmission and node authentication scheme for wireless sensing networks., , , and . J. Syst. Archit., (2022)