Author of the publication

On the security of multiple Huffman table based encryption.

, , , and . J. Visual Communication and Image Representation, 22 (1): 85-92 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

True random number generator based on mouse movement and chaotic hash function., , , , and . Inf. Sci., 179 (19): 3442-3450 (2009)Hybrid content-based publish/subscribe system., , , , and . FSKD, page 2122-2126. IEEE, (2015)Decision Making with Uncertainty., and . AIAI, volume 187 of IFIP, page 313-314. Springer, (2005)Applications of three data analysis techniques for modeling the carbon dioxide capture process., , , and . CCECE, page 1-4. IEEE, (2010)A comparison of two data analysis techniques and their applications for modeling the carbon dioxide capture process., , and . Eng. Appl. of AI, 23 (8): 1265-1276 (2010)A diagnostic system based upon knowledge and experience., , , and . Annals OR, 168 (1): 267-290 (2009)Classification of Chinese Texts Based on Recognition of Semantic Topics., , , and . Cognitive Computation, 8 (1): 114-124 (2016)A Trust-Role Based Context Aware Access Control Model., , , and . CIS, page 371-376. IEEE Computer Society, (2014)FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing., , , , , and . TrustCom, page 310-319. IEEE Computer Society, (2014)The Application Study of Dynamic Pricing Decision System Based on Multi-objective Optimization., and . ISICA, volume 316 of Communications in Computer and Information Science, page 217-227. Springer, (2012)