Author of the publication

On the security of multiple Huffman table based encryption.

, , , and . J. Vis. Commun. Image Represent., 22 (1): 85-92 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Stakeholder Game Relationships and Behaviors to Facilitate Recycled Resource Management: A Systematic Framework., , and . SMC, page 2202-2207. IEEE, (2023)Applications of three data analysis techniques for modeling the carbon dioxide capture process., , , and . CCECE, page 1-4. IEEE, (2010)WO/2012/113154 - METHOD AND DEVICE FOR ADAPTING A DATA PATH FOR A MOBILE ENTITY IN A COMMUNICATION NETWORK, , , , , and . (August 2012)http://www.freepatentsonline.com/WO2012113154.html.WO/2011/120218 - METHOD FOR RE-SELECTING A COMMUNICATION NETWORK, , , , , and . (October 2011)http://www.freepatentsonline.com/WO2011120218.html.Decision Making with Uncertainty., and . AIAI, volume 187 of IFIP, page 313-314. Springer, (2005)Research on performance analysis and optimization methods of bistatic collaborative detection., , , , and . WUWNet, page 45:1-45:6. ACM, (2018)Smaller desert dust cooling effect estimated from analysis of dust size and abundance, , , , , , , , and . Nature Geoscience, (March 2017)A comparison of two data analysis techniques and their applications for modeling the carbon dioxide capture process., , and . Eng. Appl. Artif. Intell., 23 (8): 1265-1276 (2010)A Tool for Visualization of a Knowledge Model., , and . SEKE, page 718-723. Knowledge Systems Institute Graduate School, (2012)Subclasses of Coputable Real Valued Functions.. COCOON, volume 1276 of Lecture Notes in Computer Science, page 156-165. Springer, (1997)