Author of the publication

On the security of multiple Huffman table based encryption.

, , , and . J. Visual Communication and Image Representation, 22 (1): 85-92 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Asymptotic Stability Criteria for a Two-Neuron Network With Different Time Delays., , , and . IEEE Trans. on Circuits and Systems, 53-II (8): 682-686 (2006)A Modified Chaos-Based Joint Compression and Encryption Scheme., , and . IEEE Trans. on Circuits and Systems, 58-II (2): 110-114 (2011)On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$., , and . IEEE Trans. Computers, 59 (10): 1392-1401 (2010)On the security of multiple Huffman table based encryption., , , and . J. Visual Communication and Image Representation, 22 (1): 85-92 (2011)Distributed arithmetic coding with interval swapping., , and . Signal Processing, (2015)Stability of bifurcating periodic solutions for van der Pol equation with continuous distributed delay., , and . Applied Mathematics and Computation, 146 (2-3): 313-334 (2003)A novel particle swarm optimizer with time-delay., , and . Applied Mathematics and Computation, 186 (1): 789-793 (2007)On the security of symmetric ciphers based on DNA coding., , , and . Inf. Sci., (2014)Using recursive least square learning method for principal and minor components analysis., , and . ICASSP, page 1089-1092. IEEE, (1998)Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances, , , , and . CoRR, (2004)