From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On (k, n) Visual Cryptography Scheme with t Essential Parties., , , , и . ICITS, том 8317 из Lecture Notes in Computer Science, стр. 56-68. Springer, (2013)Information Security Display Technology with Multi-view Effect., , , , и . IWDW, том 10082 из Lecture Notes in Computer Science, стр. 198-208. (2016)Collusive Attacks to Partition Authentication Visual Cryptography Scheme., , и . IWDW, том 10082 из Lecture Notes in Computer Science, стр. 238-250. (2016)Temporal Integration Based Visual Cryptography Scheme and Its Application., , , и . IWDW, том 10431 из Lecture Notes in Computer Science, стр. 406-419. Springer, (2017)The Security Defect of a Multi-pixel Encoding Method., , , , , и . ISC, том 7807 из Lecture Notes in Computer Science, стр. 39-48. Springer, (2013)On the Randomness of Visual Cryptography Scheme., , , , и . IIH-MSP, стр. 391-394. IEEE, (2013)Threshold Secret Image Sharing., , , , , и . ICICS, том 8233 из Lecture Notes in Computer Science, стр. 404-412. Springer, (2013)Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square., , , и . ACM Trans. Multim. Comput. Commun. Appl., 19 (2s): 77:1-77:21 (2023)A New Construction of Tagged Visual Cryptography Scheme., , , , и . IWDW, том 9569 из Lecture Notes in Computer Science, стр. 433-445. Springer, (2015)