Author of the publication

Designated Verification of Non-invertible Watermark.

, , , and . ISC, volume 2851 of Lecture Notes in Computer Science, page 338-351. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data., , , , , and . Simulation Modelling Practice and Theory, 18 (4): 431-435 (2010)U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home., , , and . J. Intelligent Manufacturing, 20 (3): 337-346 (2009)Impersonation Attack on a Strong ID-Based Key Distribution., , and . IEICE Transactions, 91-B (8): 2702-2703 (2008)Side Channel Cryptanalysis on XTR Public Key Cryptosystem., , , and . IEICE Transactions, 88-A (5): 1214-1223 (2005)A Field Guide to Hidden Accounting Information Detection., , , , and . FGCN (2), page 146-150. IEEE Computer Society, (2007)Windows Pagefile Collection and Analysis for a Live Forensics Context., , , and . FGCN (2), page 97-101. IEEE Computer Society, (2007)Practical off-line authentication., , , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 141-148. SPIE, (2002)Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications., , , , and . IEICE Transactions, 91-D (5): 1481-1484 (2008)An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves., , , and . Public Key Cryptography, volume 2274 of Lecture Notes in Computer Science, page 323-334. Springer, (2002)Related-Key Attacks on Reduced Rounds of SHACAL-2., , , , and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 175-190. Springer, (2004)