Author of the publication

Designated Verification of Non-invertible Watermark.

, , , and . ISC, volume 2851 of Lecture Notes in Computer Science, page 338-351. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Password Recovery Using an Evidence Collection Tool and Countermeasures., , , and . IIH-MSP, page 97-102. IEEE Computer Society, (2007)Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , and . J. Cryptology, 19 (4): 441-462 (2006)Detection of Zombie PCs Based on Email Spam Analysis., , , and . TIIS, 6 (5): 1445-1462 (2012)Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment., , , , and . PerCom, page 584-589. IEEE Computer Society, (2008)A Methodology for Forensic Analysis of Embedded Systems., and . FGCN (2), page 283-286. IEEE Computer Society, (2008)978-0-7695-3431-2.USB PassOn: Secure USB Thumb Drive Forensic Toolkit., , , , , and . FGCN (2), page 279-282. IEEE Computer Society, (2008)978-0-7695-3431-2.DES with any reduced masked rounds is not secure against side-channel attacks., , and . Computers & Mathematics with Applications, 60 (2): 347-354 (2010)Markov Chain Approximation Algorithm for Event-Based State Estimation., , and . IEEE Trans. Contr. Sys. Techn., 23 (3): 1123-1130 (2015)Improving Bounds for the Number of Correlation Immune Boolean Functions., , , and . Inf. Process. Lett., 61 (4): 209-212 (1997)A research on the investigation method of digital forensics for a VMware Workstation's virtual machine., , , , and . Mathematical and Computer Modelling, 55 (1-2): 151-160 (2012)