×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of chin-chen-chang
Spatial match retrieval based on direction signatures using multiple key hashing scheme
214 views
Tighter error bounds and weighted error metrics for hierarchical radiosity
215 views
An efficient e-mail protocol providing perfect forward secrecy for mobile devices
213 views
A novel key management scheme for dynamic multicast communications
215 views
Cryptanalysis of a password authentication scheme using quadratic residues
214 views
Remote scheme for password authentication based on theory of quadratic residues
213 views
A locally adaptive data compression strategy for Chinese-English characters
212 views
Access control with binary keys
214 views
Cryptographic key assignment scheme for access control in a hierarchy
215 views
A lossless data embedding technique by joint neighboring coding
225 views
Fast codebook search algorithms based on tree-structured vector quantization
220 views
A steganographic method for digital images using side match
219 views
SVD-based digital image watermarking scheme
218 views
A watermarking-based image ownership and tampering authentication scheme
214 views
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli
212 views
A division algorithm for residue numbers
212 views
Efficient authentication protocols of GSM
214 views
A parallel residue-to-binary conversion algorithm without trial division
218 views
An on-line electronic check system with mutual authentication
212 views
An efficient and fair buyer–seller fingerprinting scheme for large scale networks
217 views
Next >