Author of the publication

A New Robust and Reversible Watermarking Technique Based on Erasure Code.

, , , , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 153-168. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic Construction of Publicly Verifiable Predicate Encryption., , , , , , , and . AsiaCCS, page 889-894. ACM, (2016)Photo Forensics on Shanzhai Mobile Phone., , , , , , , , , and 1 other author(s). WASA, volume 7992 of Lecture Notes in Computer Science, page 454-464. Springer, (2013)EHSBoost: Enhancing ensembles for imbalanced data-sets by evolutionary hybrid-sampling., , , , , , and . SPAC, page 118-123. IEEE, (2017)White-box traceable dynamic attribute based encryption., , , , and . SPAC, page 526-530. IEEE, (2017)Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator., , , , , and . ICICS, volume 8958 of Lecture Notes in Computer Science, page 274-289. Springer, (2014)Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage., , , , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 153-169. Springer, (2016)Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability., , , and . Security and Management, page 307-313. CSREA Press, (2009)Attribute-based queries over outsourced encrypted database., , , and . SPAC, page 164-168. IEEE, (2017)Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration., , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 525-538. Springer, (2017)A Revocable Outsourcing Attribute-Based Encryption Scheme., , , , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-161. Springer, (2016)