Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Recursive Model for Arithmetic with Weak Induction., and . J. Symb. Log., 50 (1): 49-54 (1985)Hardware Implementation of the Binary Method for Exponentiation in GF(2m)., , and . ENC, page 131-134. IEEE Computer Society, (2003)A Multiple Robust Digital Watermarking System for Still Images., , and . IJCSA, 9 (3): 37-46 (2012)An ILP approach for the traveling repairman problem with unit time windows., , , and . CCE, page 1-5. IEEE, (2015)Wire-tap channel concept in nature and society., , and . IISA, page 231-236. IEEE, (2014)Concatenated digital watermarking system robust to different removal attacks., , , and . Comput. Sci. Inf. Syst., 11 (4): 1581-1594 (2014)An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities., , and . IACR Cryptology ePrint Archive, (2015)On the Existence of Perfect Stegosystems., , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 30-38. Springer, (2005)Solving the enumeration and word problems on Coxeter groups., , and . CCE, page 1-4. IEEE, (2011)A stegosystem with blind decoder based on a noisy channel., , , and . DSP, page 1-5. IEEE, (2013)